TY - JOUR
T1 - A study on the security levels of spread-spectrum embedding schemes in the WOA framework
AU - Wang, Yuan Gen
AU - Zhu, Guopu
AU - Kwong, Sam
AU - Shi, Yun Qing
N1 - Funding Information:
Manuscript received September 27, 2016; revised January 22, 2017 and July 13, 2017; accepted July 28, 2017. Date of publication August 23, 2017; date of current version July 17, 2018. This work was supported in part by the National Natural Science Foundation of China under Grant 61672443, Grant 61672554, and Grant 61572489, in part by the Hong Kong RGC General Research Fund under Grant 9042038 and Grant CityU 11205314, in part by the NSF of Guangdong Province under Grant 2014A030310112, in part by the Youth Innovation Promotion Association of the Chinese Academy of Sciences under Grant 2015299, and in part by the Science and Technology Plan Project of Guangdong Province under Grant 2016B010124014. This paper was recommended by Associate Editor Y. Zhao. (Corresponding author: Guopu Zhu.) Y.-G. Wang is with the School of Computer Science and Education Software, Guangzhou University, Guangzhou 510006, China, and also with the Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen 518060, China (e-mail: wangyg@gzhu.edu.cn).
Publisher Copyright:
© 2013 IEEE.
PY - 2018/8
Y1 - 2018/8
N2 - Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
AB - Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
KW - Kerckhoffs' principle
KW - security analysis
KW - spread-spectrum (SS) embedding
KW - watermarked-only attack (WOA)
UR - http://www.scopus.com/inward/record.url?scp=85028502102&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85028502102&partnerID=8YFLogxK
U2 - 10.1109/TCYB.2017.2735989
DO - 10.1109/TCYB.2017.2735989
M3 - Article
AN - SCOPUS:85028502102
SN - 2168-2267
VL - 48
SP - 2307
EP - 2320
JO - IEEE Transactions on Cybernetics
JF - IEEE Transactions on Cybernetics
IS - 8
ER -