On the Secure Watermark Embedding Scheme Based on Selective Encryption
نویسندگان
چکیده
Some joint fingerprinting and decryption (JFD) schemes used for copyright protection were reported recently. However, most of them need to be investigated before practical applications. In this paper, the typical one proposed by Lemma et al. is investigated and evaluated. Since this scheme aims to distribute multimedia content by encryption and watermarking, some important performances determine its practicability, including the perceptual security of the encryption operation, the imperceptibility of the embedded watermark and the robustness of the embedded watermark. Some flaws are found in the scheme, such as the low encryption strength, the data overflow caused by encryption/decryption and the low correlation value caused by collusion, which degrade the performances greatly. To improve the scheme, some means are proposed, including adaptive media preprocessing, chaos-based selective media module addition and collusion-resistant fingerprint encoding. Comparative experiments show that better performances are obtained by the improved means. The analysis method proposed in this paper can be used to investigate some other JFD schemes.
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملRobust audio watermarking using frequency-selective spread spectrum
A novel audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique is presented. Unlike most of the existing spread spectrum (SS) watermarking schemes that use the entire audible frequency range for watermark embedding, the proposed scheme randomly selects subband(s) signal(s) of the host audio signal for watermark embedding. The proposed FSSS scheme provides a natu...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Intelligent Automation & Soft Computing
دوره 17 شماره
صفحات -
تاریخ انتشار 2011