Watermarking security

Teddy Furon 1
1 LinkMedia - Creating and exploiting explicit links between multimedia fragments
IRISA-D6 - MEDIA ET INTERACTIONS, Inria Rennes – Bretagne Atlantique
Abstract : This chapter deals with applications where watermarking is a security primitive included in a larger system protecting the value of multimedia content. In this context, there might exist dishonest users, in the sequel so-called attackers, willing to read/overwrite hidden messages or simply to remove the watermark signal. The goal of this section is to play the role of the attacker. We analyze means to deduce information about the watermarking technique that will later ease the forgery of attacked copies. This chapter first proposes a topology of the threats in Section 6.1, introducing three different concepts: robustness, worst-case attacks, and security. Previous chapter has already discussed watermark robustness. We focus on worst-case attacks in Section 6.2, on the way to measure watermarking security in Section 6.3, and on the classical tools to break a watermarking scheme in Section 6.4. This tour of watermarking security concludes by a summary of what we know and still do not know about it (Section 6.5) and a review of oracle attacks (Section 6.6). Last, Section 6.7 deals with protocol attacks, a notion which underlines the illusion of security that a watermarking primitive might bring when not properly used in some applications.
Type de document :
Chapitre d'ouvrage
Information hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5
Liste complète des métadonnées

Littérature citée [43 références]  Voir  Masquer  Télécharger

Contributeur : Teddy Furon <>
Soumis le : mercredi 24 février 2016 - 14:08:27
Dernière modification le : mercredi 28 février 2018 - 10:23:17
Document(s) archivé(s) le : dimanche 13 novembre 2016 - 02:20:20


Fichiers produits par l'(les) auteur(s)


  • HAL Id : hal-01275880, version 1


Teddy Furon. Watermarking security. Information hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5. 〈hal-01275880〉



Consultations de la notice


Téléchargements de fichiers