A Cryptographic Method for Secure Watermark Detection
نویسندگان
چکیده
We present a semi-public key implementation of quantization index modulation (QIM) watermarking called Secure QIM (SQIM). Given a signal, a watermark detector can learn the presence of an SQIM watermark without learning anything anything else from the detection process. The watermark detector first transforms the signal with a secret transform, unknown to the detector, and then quantizes the transform coefficients with secret quantizers, also unknown to the detector. This is done with the use of homomorphic cryptosystems, where calculations are performed in an encrypted domain. A low-power, trusted, secure module is used at the end of the process and reveals only if the signal was watermarked or not. Even after repeated watermark detections, no more information is revealed than the watermarked status of the signals. The methods we present are for watermark systems with quantizers of stepsize 2.
منابع مشابه
Secure Tamper Localization in Binary Document Image Authentication
In this paper, we propose a novel method for secure tamper localization in binary document images using erasable watermarks. For binary images, watermarking with pixel flipping approach is a difficult task, because it can bring noticeable visual distortion. In localization, finding sufficient number of low-distortion pixels in a block to embed the cryptographic signature and their blind detecti...
متن کاملSecure Copyright Protection Techniques for Digital Images
This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the mag...
متن کاملSound proofs of authorship and distribution of digital rights
Secure distribution and protection of digital content has become a crucial problem in the Digital Millennium. Digital Rights Management (DRM) systems are technical means for the secure distribution, processing and consumption of digital content. The major driving force behind the research, development and deployment of DRM systems are the music and film industries, seeking for technical means t...
متن کاملRst-invariant Digital Watermarking Based on Template and Log-polar Mapping
This paper proposes a rotation, scaling, and translation (RST) resistant watermarking over the template matchingbased method. A one-way hash function is utilized to generate the highly secure embedding positions in the mid-frequencies against position attacks. A spread spectrum watermark is embedded into these positions in the frequency domain based on the local perceptual capability. This spre...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کامل