A Cryptographic Method for Secure Watermark Detection

نویسندگان

  • Michael Malkin
  • Ton Kalker
چکیده

We present a semi-public key implementation of quantization index modulation (QIM) watermarking called Secure QIM (SQIM). Given a signal, a watermark detector can learn the presence of an SQIM watermark without learning anything anything else from the detection process. The watermark detector first transforms the signal with a secret transform, unknown to the detector, and then quantizes the transform coefficients with secret quantizers, also unknown to the detector. This is done with the use of homomorphic cryptosystems, where calculations are performed in an encrypted domain. A low-power, trusted, secure module is used at the end of the process and reveals only if the signal was watermarked or not. Even after repeated watermark detections, no more information is revealed than the watermarked status of the signals. The methods we present are for watermark systems with quantizers of stepsize 2.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Tamper Localization in Binary Document Image Authentication

In this paper, we propose a novel method for secure tamper localization in binary document images using erasable watermarks. For binary images, watermarking with pixel flipping approach is a difficult task, because it can bring noticeable visual distortion. In localization, finding sufficient number of low-distortion pixels in a block to embed the cryptographic signature and their blind detecti...

متن کامل

Secure Copyright Protection Techniques for Digital Images

This paper presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images is described. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the mag...

متن کامل

Sound proofs of authorship and distribution of digital rights

Secure distribution and protection of digital content has become a crucial problem in the Digital Millennium. Digital Rights Management (DRM) systems are technical means for the secure distribution, processing and consumption of digital content. The major driving force behind the research, development and deployment of DRM systems are the music and film industries, seeking for technical means t...

متن کامل

Rst-invariant Digital Watermarking Based on Template and Log-polar Mapping

This paper proposes a rotation, scaling, and translation (RST) resistant watermarking over the template matchingbased method. A one-way hash function is utilized to generate the highly secure embedding positions in the mid-frequencies against position attacks. A spread spectrum watermark is embedded into these positions in the frequency domain based on the local perceptual capability. This spre...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006