Presentation | 2016-07-14 Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In general, watermark information is embedded into the host signals selected from digital content according to a secret key. However, the selected host signals can be easily classified from given watermarked content if all algorithms except for the secret key are in public based on the Kerckhoffs' principle. One of the countermeasures was proposed in ICIP2015 that introduced a simple obfuscating operation. The drawback of the method is the redundancy in the entire watermarking process. Although an alternative method was also presented by the identification of the process, the robustness against attack was decreased in the experiment. In this study, we analyze the reason of the degradation of the performance, and confirm the effects of some signal processing operations in the watermarking process including the obfuscating operation. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | watermarking / Kerckhoffs' principle / obfuscating operations / security |
Paper # | ISEC2016-14,SITE2016-8,ICSS2016-14,EMM2016-22 |
Date of Issue | 2016-07-07 (ISEC, SITE, ICSS, EMM) |
Conference Information | |
Committee | EMM / ISEC / SITE / ICSS / IPSJ-CSEC / IPSJ-SPT |
---|---|
Conference Date | 2016/7/14(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | security, etc |
Chair | Akinori Ito(Tohoku Univ.) / Masahiro Mambo(Kanazawa Univ.) / Hitoshi Okada(NII) / Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Masaki Kawamura(Yamaguchi Univ.) / Hirohisa Hioki(Kyoto Univ.) / Kazuto Ogawa(NHK) / Atsushi Fujioka(Kanagawa Univ.) / Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.) / Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric) |
Secretary | Masaki Kawamura(Nagasaki Univ.) / Hirohisa Hioki(Osaka Pref. Univ.) / Kazuto Ogawa(Toshiba) / Atsushi Fujioka(Tohoku Univ.) / Tetsuya Morizumi(Kyushu Univ.) / Masaru Ogawa(Gifu Shotoku Gakuen Univ.) / Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.) |
Assistant | Rui Shogenji(Shizuoka Univ.) / Masaaki Fujiyoshi(Tokyo Metropolitan Univ.) / Toshihiro Ohigashi(Tokai Univ.) / Yuuji Suga(IIJ) / Atsuo Inomata(Tokyo Denki Univ.) / Kanako Kawaguchi(Tokyo Univ. of the Arts) / Kazunori Kamiya(NTT) / Takahiro Kasama(NICT) |
Paper Information | |
Registration To | Technical Committee on Enriched MultiMedia / Technical Committee on Information Security / Technical Committee on Social Implications of Technology and Information Ethics / Technical Committee on Information and Communication System Security / Special Interest Group on Computer Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle |
Sub Title (in English) | |
Keyword(1) | watermarking |
Keyword(2) | Kerckhoffs' principle |
Keyword(3) | obfuscating operations |
Keyword(4) | security |
1st Author's Name | Koichiro Yamashita |
1st Author's Affiliation | Okayama University(Okayama Univ.) |
2nd Author's Name | Minoru Kuribayashi |
2nd Author's Affiliation | Okayama University(Okayama Univ.) |
3rd Author's Name | Nobuo Funabiki |
3rd Author's Affiliation | Okayama University(Okayama Univ.) |
Date | 2016-07-14 |
Paper # | ISEC2016-14,SITE2016-8,ICSS2016-14,EMM2016-22 |
Volume (vol) | vol.116 |
Number (no) | ISEC-129,SITE-130,ICSS-131,EMM-132 |
Page | pp.pp.7-12(ISEC), pp.7-12(SITE), pp.7-12(ICSS), pp.7-12(EMM), |
#Pages | 6 |
Date of Issue | 2016-07-07 (ISEC, SITE, ICSS, EMM) |