Академический Документы
Профессиональный Документы
Культура Документы
Tutorial 7
(Lecture 7)
In every application of watermarking, some people must have the ability to embed, detect,
and/or remove watermarks, whereas others must be restricted from performing some or all
of these actions.
Secure watermarks are required to enforce these restrictions, and therefore it is useful to
analyze the security requirements of an application by specifying who is allowed to perform
which operations.
For a given application, we divide the world into a number of different groups and assign a
set of permissions to each to determine the security properties required for the watermarking
system.
Private Watermarking - The use of watermarking for any application in which a group called
the public is not authorized to perform any watermarking operations, including watermark
embedding, watermark detection and watermark removal.
Public Watermarking - The use of watermarking for any application in which a group called
the public is authorized to detect the watermark, but is not authorized to perform any
other watermarking operations such as watermark embedding and watermark removal.
3. Briefly describe the assumptions to be made about the capabilities of the adversary when
judging the security of a watermark.
1
TDW3431 Digital Watermarking Trimester 1, 2014/2015
Such a system requires two keys: watermark key controls the watermarking layer; and
encryption key controls the encryption layer.
The addition of an encryption layer ensures message security, i.e., that someone who detects
the watermark cannot decode its meaning.
In certain systems, it can prevent the adversary from determining the presence of a watermark,
as an adversary that has the watermark key but does not have the cipher key would be unable
to determine the presence of watermark.
2
TDW3431 Digital Watermarking Trimester 1, 2014/2015
5. The encryption and watermarking layers can be viewed as analogous to two layers of a networking
system: message and transport layers. Illustrate the two-layered watermarking system, and
identify the major responsibility of message and transport layers.
Message layer is responsible for determining what messages to be transmitted over the
network, and
Transport layer is responsible for ensuring that transmitted messages arrive uncorrupted.
The addition of an encryption layer ensures message security, i.e., that someone who
detects the watermark cannot decode its meaning.
In certain systems, it can prevent the adversary from determining the presence of a
watermark. Specifically, if a watermark system is designed to determine the presence of a
watermark by distinguishing between valid and invalid messages, it may be impossible to
identify valid messages without decrypting.
Hence, an adversary that has the watermark key but does not have the cipher key would be
unable to determine the presence of watermark.
7. What is the limitation of appending the entire cover work to the embedded message before
computing a cryptographic signature? Suggest a method that can be used to solve with the
limitation.
This approach would fail because the embedding process modifies the work, which makes
the signature invalid.
To work around this problem, we might sign only a portion of the work, such as the lowest-
frequency components, rather than the entire work.
If the embedding process is designed in such a way that it does not change this portion of the
work, the signature should still be valid after the watermark is embedded.
3
TDW3431 Digital Watermarking Trimester 1, 2014/2015
8. Figure 1 shows the steps of embedding a watermark message along with a cryptographic
signature computed through a one-way hash of the watermark message concatenated with the
description of the cover work. Explain the corresponding watermark detection and watermark
validation processes using a diagram.
4
TDW3431 Digital Watermarking Trimester 1, 2014/2015
Detect and decode the watermark, obtaining a message and a cryptographic signature.
Construct the same description of the cover work that was constructed by sender.
Compute the one-way hash of the watermark message concatenated with the description of
the cover work.
Compare the decoded signature against the hash of the message and cover work
description. If they are identical, the receiver can know that the sender composed this message
and embedded it in this work.