Key Independent Watermark Detection

نویسندگان

  • Ron G. van Schyndel
  • Andrew Z. Tirkel
  • Imants D. Svalbe
چکیده

Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data. Legendre sequences are a suitable candidate for signature encryption as they exhibit ‘perfect’ two level auto-correlation. Additionally, Legendre sequences have the unusual and interesting property of invariance under Fourier transformation; the spatial and frequency representation of each sequence is identical up to a phase factor. The presence of a Legendre-based watermark, embedded in the pixel or transform domain, can be detected by cross-correlating a sequence-encrypted image with its Fourier transform. This property enables verification of the presence of a watermark (of specified length), without requiring prior knowledge of the sequence type or key used for the encryption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermark Detection and Extraction Using Independent Component Analysis Method

This paper proposes a new image watermarking technique, which adopts Independent Component Analysis (ICA) for watermark detection and extraction process (i.e., dewatermarking). Watermark embedding is performed in the spatial domain of the original image. Watermark can be successfully detected during the Principle Component Analysis (PCA) whitening stage. A nonlinear robust batch ICA algorithm, ...

متن کامل

Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure

The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used ...

متن کامل

Exhaustive geometrical search and the false positive watermark detection probability

One way of recovering watermarks in geometrically distorted images is by performing a geometrical search. In addition to the computational cost required for this method, this paper considers the more important problem of false positives. The maximal number of detections that can be performed in a geometrical search is bounded by the maximum false positive detection probability required by the w...

متن کامل

Audio Watermark Detection Using Undetermined ICA

This paper presents a audio watermark detection scheme using the undetermined independent analysis. The proposed detection scheme removes audio spectrum from the watermarked audio signal. And then, ICA-based detector estimates the hidden independent sources from the received watermarked signal using BSS for underdetermined mixtures based on ICA.

متن کامل

A Digital Watermarking Scheme Based on Ica Detection

The scheme proposed in this paper combines independent components analysis (ICA) with discrete wavelet transform (DWT) and discrete cosine transform (DCT). Firstly, the original image is decomposed by 2-D DWT and the detail sub-bands are reserved. Then, the approximate image is transformed by DCT and embedded with watermark. The watermark is detected through ICA. The simulation results demonstr...

متن کامل

Blind Tamper Detection in Audio using Chirp based Robust Watermarking

In this paper, we propose the use of ‘chirp coding’ for embedding a watermark in audio data without generating any perceptual degradation of audio quality. A binary sequence (the watermark) is derived using energy based features from the audio signal and chirp coding used to embed the watermark in audio data. The chirp coding technique is such that the same watermark can be derived from the ori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999