An Asymmetric Public Detection Watermarking Technique
نویسندگان
چکیده
The new watermarking technique presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the secret key used in the embedding process. It is the translation, in the watermarking domain, of a public key pair cryptosystem. The key idea is to filter the pseudo-noise sequence before embedding it in the cover-content. Contrary to classical techniques, the heart of the detection algorithm is not a correlation measure but a consistent statistical test hypothesis in spectral analysis. Some signal based considerations show that knowing the public key used in the detection process is no use for pirate who wants to discover the secret key. An example of a copyright protection system for digital content using this technique is briefly described.
منابع مشابه
Global Journal of Computer Science and Technology
This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret sequence. The detection process is imple...
متن کاملMultimedia asymmetric watermarking and encryption
An asymmetric watermarking algorithm is presented, involving a private key for embedding and a public key for detection, joint with a suitable encryption scheme, thus achieving a double security level for digital data protection. A commutative scheme is designed based on linear algebra and on a secret random permutation, allowing both to cipher watermarked data and to mark encrypted data withou...
متن کاملAsymmetric Fragile Watermarking Using a Number Theoretic Transform
We propose an asymmetric fragile watermarking technique that uses a number theoretic transform (NTT). Signature data is extracted from a watermarked image by determining correlation functions that are computed using the NTT. The effectiveness of the proposed method is evaluated by simulated detection of altering. key words: number theoretic transform, asymmetric watermarking, fragile watermarki...
متن کاملA joint asymmetric watermarking and image encryption scheme
Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we pre...
متن کاملPlain Text Zero Knowledge Watermarking Detection Based on Asymmetric Encryption
Digital watermarking technology plays an important role in the areas of copyright protection and identity tracing for owners of digital mediums. At present, the security of the watermarking scheme is facing a great threat. However, the existing Zero knowledge-based watermark detection scheme (ZKWD) are still facing some challenging problems, such as ambiguity attacks. In this paper, a public ZK...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999