Security and synchronization in watermark sequence

Litao Gang, Ali N. Akansu, Mahalingam Ramkumar

Research output: Contribution to journalConference articlepeer-review

6 Scopus citations

Abstract

In a mature watermarking and steganography application, the security should lie in the unknown random keys not in the embedding algorithms. In this paper, the problem of the selection of watermarking random sequences is investigated. In the widely used Spread Spectrum modulation schemes, a white sequence and a Low-Pass (LP) type sequences are analyzed, including its security level and synchronization requirements. It is found that the white independent is more secure but not robust against LP attack. Also it is not energy efficient. Actually The random sequence selection is usually the tradeoff between these factors. To be resilient to the removal attacks, the watermark spectrum should be similar to the spectrum of the cover signal. A watermarking sequence with fixed amplitude spectrum shape and random phase is proposed in the last part of the paper and its properties are discussed in detail.

Original languageEnglish (US)
Pages (from-to)IV/3736-IV/3739
JournalICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Volume4
DOIs
StatePublished - 2002
Event2002 IEEE International Conference on Acoustic, Speech, and Signal Processing - Orlando, FL, United States
Duration: May 13 2002May 17 2002

All Science Journal Classification (ASJC) codes

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Security and synchronization in watermark sequence'. Together they form a unique fingerprint.

Cite this