Practical Security of Non-Invertiblewatermarking Schemes

Qiming Li, N. Memon
{"title":"Practical Security of Non-Invertiblewatermarking Schemes","authors":"Qiming Li, N. Memon","doi":"10.1109/ICIP.2007.4380050","DOIUrl":null,"url":null,"abstract":"Designing secure digital watermarking schemes resistant to invertibility attacks (or more generally, ambiguity attacks) has been challenging. In a recent work, Li and Chang (IHW'04) give the first stand-alone provably secure non-invertible spread-spectrum watermarking scheme based on cryptographically secure pseudo-random generators. Despite its provable security, there are certain constraints on the security parameters that require further analysis in practice, where it is more important to analyze the exact security instead of theoretical asymptotic bounds. In this paper, we consider a security notion that is slightly weaker theoretically but still reasonable in practice, and show that with this alternative security notion, the exact requirements on the parameters can be analyzed, and such analysis can be used to guide flexible implementations of similar schemes in practice.","PeriodicalId":131177,"journal":{"name":"2007 IEEE International Conference on Image Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Image Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIP.2007.4380050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Designing secure digital watermarking schemes resistant to invertibility attacks (or more generally, ambiguity attacks) has been challenging. In a recent work, Li and Chang (IHW'04) give the first stand-alone provably secure non-invertible spread-spectrum watermarking scheme based on cryptographically secure pseudo-random generators. Despite its provable security, there are certain constraints on the security parameters that require further analysis in practice, where it is more important to analyze the exact security instead of theoretical asymptotic bounds. In this paper, we consider a security notion that is slightly weaker theoretically but still reasonable in practice, and show that with this alternative security notion, the exact requirements on the parameters can be analyzed, and such analysis can be used to guide flexible implementations of similar schemes in practice.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
非可逆水印方案的实际安全性
设计安全的数字水印方案抵抗可逆性攻击(或更一般地说,歧义攻击)一直是一个挑战。在最近的一项工作中,Li和Chang (IHW'04)给出了第一个基于加密安全伪随机生成器的独立可证明安全的不可逆扩频水印方案。尽管其安全性是可证明的,但其安全性参数存在一定的约束条件,需要在实践中进一步分析,在实践中更重要的是分析确切的安全性,而不是理论的渐近界。在本文中,我们考虑了一种理论上略弱但在实践中仍然合理的安全概念,并表明利用这种替代的安全概念,可以分析对参数的确切需求,并可以在实践中指导类似方案的灵活实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Block-Based Gradient Domain High Dynamic Range Compression Design for Real-Time Applications Generation of Layered Depth Images from Multi-View Video Detection Strategies for Image Cube Trajectory Analysis An Efficient Compression Algorithm for Hyperspectral Images Based on Correlation Coefficients Adaptive Three Dimensional Wavelet Zerotree Coding Enabling Introduction of Stereoscopic (3D) Video: Formats and Compression Standards
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1