DocumentCode :
864275
Title :
Security analysis of transformed-key asymmetric watermarking system
Author :
Chen, I-Te ; Yeh, Yi-Shiung
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
Volume :
13
Issue :
4
fYear :
2006
fDate :
4/1/2006 12:00:00 AM
Firstpage :
213
Lastpage :
215
Abstract :
Asymmetric watermarking schemes have been widely discussed recently. Transformed-key asymmetric watermarking (TKAW) system is one of the schemes, which was proposed by Choi et al. This letter discusses the weaknesses of TKAW. In TKAW, the inner product of the received signal and public key almost equals to zero. As a result, it cannot resist projection attack. To prove this point, we will demonstrate how to find the most relevant unwatermarked signal y˜ for a given watermark embedded signal y and prove that ||y-y||≤|α|, where α is a constant adjusted to a value that makes the watermark imperceptible. Moreover, we also find that the feature y-y˜, a predicted watermark of a stego image, can be copied from a stego image to another image, which means that the TKAW system cannot resist copy attack either.
Keywords :
cryptography; data encapsulation; telecommunication security; watermarking; TKAW; embedded signal; projection attack; security analysis; stego image; transformed-key asymmetric watermarking system; Additive noise; Authentication; Computer science; Copyright protection; Councils; Fingerprint recognition; Public key; Resists; Signal processing; Watermarking; Asymmetric watermarking; copy attack; projection attack; transformed key;
fLanguage :
English
Journal_Title :
Signal Processing Letters, IEEE
Publisher :
ieee
ISSN :
1070-9908
Type :
jour
DOI :
10.1109/LSP.2005.863677
Filename :
1605241
Link To Document :
بازگشت