A Public-key Asymmetric Robust Watermarking Algorithm Based on Signal with Special Correlation Characteristic
نویسندگان
چکیده
A public-key asymmetric robust watermarking algorithm based on signal with special correlation characteristic is proposed in this paper. This algorithm is designed to permit pubic watermark detection while preventing the watermark from being removed without the private keys. A signal, which is pseudorandom sequence with special auto-correlation characteristic, is used as watermark, and the signal’s characteristic is the foundation of this algorithm. Therefore we first construct the method of generating the pseudorandom sequence and prove its auto-correlation characteristic. Then we describe the algorithm in detail. Experiment results show that the algorithm is valid and robust to common signal distortions and malicious attacks.
منابع مشابه
Global Journal of Computer Science and Technology
This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret sequence. The detection process is imple...
متن کاملA Robust Public-key Watermarking Algorithm Based on Contourlet Transform and its Application
This paper proposed a robust public-key watermarking algorithm based on contourlet transform and its application in coal mining information construction combining the practice. A solution scheme combining the robust watermarking technology and Hash algorithm was proposed to meet the robustness and security requirements of the Electric Equipment Operation Tickets (EEOT). The scheme used the cert...
متن کاملAn Asymmetric Public Detection Watermarking Technique
The new watermarking technique presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the secret key used in the embedding process. It is the translation, in the watermarking domain, of a public key pair cryptosystem. The key idea is to filter the pseudo-noise sequence before embedding it in the cover-content....
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملA Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm
Introduction:In this study, ECG signals have been embedded into medical images to create a novel blind watermarking method. The embedding is done when the original image is compressed using the EZW algorithm. The extraction process is performed at the decompression time of the watermarked image. Materials and Methods: The multi-resolution watermarking with a secret key algorithm developed in th...
متن کامل