Back to Search Start Over

Practical Security Analysis of Dirty Paper Trellis Watermarking.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Furon, Teddy
Cayre, François
Doërr, Gwenaël
Bas, Patrick
Source :
Information Hiding (978-3-540-77369-6); 2008, p174-188, 15p
Publication Year :
2008

Abstract

This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN). [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540773696
Database :
Complementary Index
Journal :
Information Hiding (978-3-540-77369-6)
Publication Type :
Book
Accession number :
33879947
Full Text :
https://doi.org/10.1007/978-3-540-77370-2_12