Paper
21 March 2005 Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms
Chuhong Fei, Deepa Kundur, Raymond Kwong
Author Affiliations +
Abstract
This paper focuses on the analysis and enhancement of watermarking based security strategies for multimedia authentication. Based on an authentication game between a transmitter and its authorized receiver, and an opponent, security of authentication watermarking is measured by the opponent's inability to launch a successful attack. In this work, we consider two traditional classes of security for authentication: computational security and unconditional security. First we identify authentication watermarking as an error detection problem, which is different from error correction coding in robust watermarking. Then we analyze the computational and unconditional security requirements of an error detection code structure associated with quantization-based authentication watermarking schemes. We propose a novel security enhancement strategy that results in efficient and secure quantization-based embedding and verification algorithms. For computational security, cryptographic message authentication codes are incorporated while unconditional security is obtained by using unconditionally secure authentication codes. Both theoretical analysis and experimental results are presented. They show that using our approach, protection is achieved without significant increase in embedding distortion, and without sacrificing computational efficiency of the embedding and verification algorithms.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chuhong Fei, Deepa Kundur, and Raymond Kwong "Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms", Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); https://doi.org/10.1117/12.586388
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Computer programming

Distortion

Receivers

Information security

Binary data

Quantization

RELATED CONTENT


Back to Top