Key Independent Watermark Detection
نویسندگان
چکیده
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data. Legendre sequences are a suitable candidate for signature encryption as they exhibit ‘perfect’ two level auto-correlation. Additionally, Legendre sequences have the unusual and interesting property of invariance under Fourier transformation; the spatial and frequency representation of each sequence is identical up to a phase factor. The presence of a Legendre-based watermark, embedded in the pixel or transform domain, can be detected by cross-correlating a sequence-encrypted image with its Fourier transform. This property enables verification of the presence of a watermark (of specified length), without requiring prior knowledge of the sequence type or key used for the encryption.
منابع مشابه
Watermark Detection and Extraction Using Independent Component Analysis Method
This paper proposes a new image watermarking technique, which adopts Independent Component Analysis (ICA) for watermark detection and extraction process (i.e., dewatermarking). Watermark embedding is performed in the spatial domain of the original image. Watermark can be successfully detected during the Principle Component Analysis (PCA) whitening stage. A nonlinear robust batch ICA algorithm, ...
متن کاملTamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure
The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used ...
متن کاملExhaustive geometrical search and the false positive watermark detection probability
One way of recovering watermarks in geometrically distorted images is by performing a geometrical search. In addition to the computational cost required for this method, this paper considers the more important problem of false positives. The maximal number of detections that can be performed in a geometrical search is bounded by the maximum false positive detection probability required by the w...
متن کاملAudio Watermark Detection Using Undetermined ICA
This paper presents a audio watermark detection scheme using the undetermined independent analysis. The proposed detection scheme removes audio spectrum from the watermarked audio signal. And then, ICA-based detector estimates the hidden independent sources from the received watermarked signal using BSS for underdetermined mixtures based on ICA.
متن کاملA Digital Watermarking Scheme Based on Ica Detection
The scheme proposed in this paper combines independent components analysis (ICA) with discrete wavelet transform (DWT) and discrete cosine transform (DCT). Firstly, the original image is decomposed by 2-D DWT and the detail sub-bands are reserved. Then, the approximate image is transformed by DCT and embedded with watermark. The watermark is detected through ICA. The simulation results demonstr...
متن کاملBlind Tamper Detection in Audio using Chirp based Robust Watermarking
In this paper, we propose the use of ‘chirp coding’ for embedding a watermark in audio data without generating any perceptual degradation of audio quality. A binary sequence (the watermark) is derived using energy based features from the audio signal and chirp coding used to embed the watermark in audio data. The chirp coding technique is such that the same watermark can be derived from the ori...
متن کامل