Computer Science – Cryptography and Security
Scientific paper
2012-02-16
Computer Science
Cryptography and Security
Scientific paper
Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.
Bas Patrick
Furon Teddy
No associations
LandOfFree
The Effective Key Length of Watermarking Schemes does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with The Effective Key Length of Watermarking Schemes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and The Effective Key Length of Watermarking Schemes will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-125376