The Effective Key Length of Watermarking Schemes

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

The Effective Key Length of Watermarking Schemes does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with The Effective Key Length of Watermarking Schemes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and The Effective Key Length of Watermarking Schemes will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-125376

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.