1,221 Hits in 3.0 sec

An Asymmetric Public Detection Watermarking Technique [chapter]

Teddy Furon, Pierre Duhamel
2000 Lecture Notes in Computer Science  
The new watermarking technique 1 presented in this paper is an example of an asymmetric public detection scheme.  ...  The detection process does not need the original picture nor the secret key used in the embedding process. It is the translation, in the watermarking domain, of a public key pair cryptosystem.  ...  an asymmetric watermarking scheme.  ... 
doi:10.1007/10719724_7 fatcat:rvltoyzhsfamjpefgw3jipmdcu

Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach

Rinaldi Munir, Riyanto T. Bambang, Sarwono Sutikno, Wiseto P. Agung
2009 2009 International Conference on Electrical Engineering and Informatics  
This paper presents an asymmetric watermarking technique derived from Barni Algorithm, a symmetric watermarking technique, using statistical approach.  ...  This asymmetric version uses secret watermark as private key and public watermark as public key.  ...  Asymmetric Technique We derive an asymmetric technique from Barni Algorithm. Key of this transformation is based on process of generating the private key and the public key.  ... 
doi:10.1109/iceei.2009.5254778 fatcat:bcck33ys75bwnkl2uwqreoaa2a

An Asymmetric Watermarking Method in the DCT Domain Based on RC4-Permutation and Chaotic Map

Rinaldi Munir, Bambang Riyanto, Sarwono Sutikno, Wiseto P. Agung
2007 ITB Journal of Information and Communication Technology  
This paper presents an asymmetric watermarking method in the DCT domain for still images based on permutation and chaos.  ...  The detection process is implemented by correlation test between the public watermark and the received image.  ...  Therefore, an asymmetric watermarking can provide public detection, but the secret key cannot be deduced from the public key.  ... 
doi:10.5614/itbj.ict.2007.1.2.1 fatcat:kk42xx2plrej5knmwhj2e7guny

Asymmetric Watermarking Schemes [chapter]

Joachim J. Eggers, Jonathan K. Su, Bernd Girod
2000 Sicherheit in Netzen und Medienströmen  
In this paper, we review recent proposals for asymmetric watermarking and analyze their performance.  ...  In such a scheme the detector only needs to know a public key, which does not give enough information to make watermark removal possible.  ...  Acknowledgement We thank Teddy Furon for the frequent email discussion concerning the topic of asymmetric watermarking schemes.  ... 
doi:10.1007/978-3-642-58346-9_11 fatcat:e7uytl3unbddbkkl5adgg2g3ny

Security analysis of transformed-key asymmetric watermarking system

I-Te Chen, Yi-Shiung Yeh
2006 IEEE Signal Processing Letters  
Asymmetric watermarking schemes have been widely discussed recently. Transformed-key asymmetric watermarking (TKAW) system is one of the schemes, which was proposed by Choi et al.  ...  In TKAW, the inner product of the received signal and public key almost equals to zero. As a result, it cannot resist projection attack.  ...  However, in the asymmetric watermarking system, the detection method is public; a pirate can try at will to trace the direction between watermark-embedded image and original image and therefore locate  ... 
doi:10.1109/lsp.2005.863677 fatcat:3tjy4tlxonfm7ikxkvvg7ffkca

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information

2008 IEICE transactions on information and systems  
Asymmetric Watermark Detection [5] Minematsu proposed an asymmetric watermark scheme [5] in 2000.  ...  Conclusions An asymmetric digital watermarking protocol provides se- cure detection by hybridizing statistical watermarking and homomorphic public-key encryption.  ... 
doi:10.1093/ietisy/e91-d.5.1348 fatcat:6rlvcryn6je4nmjvn6asmpxnhq

An asymmetric watermarking method

T. Furon, P. Duhamel
2003 IEEE Transactions on Signal Processing  
This paper presents an asymmetric watermarking method as an alternative to classical direct sequence spread spectrum and watermarking Costa schemes techniques.  ...  This new method provides a higher security level against malicious attacks threatening watermarking techniques used for a copy protection purpose.  ...  This allows us to derive an asymmetric version from any classical watermarking techniques.  ... 
doi:10.1109/tsp.2003.809376 fatcat:czsltcomgbacbf34rwileol2da

Unified approach of asymmetric watermarking schemes

Teddy Furon, Ilaria Venturini, Pierre Duhamel, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security.  ...  This allows to stress common features about security of asymmetric schemes.  ...  Thus, a public key watermarking scheme is an improvement with respect to an asymmetric scheme because it has been proven that the disclosure of the detection key strictly confers no advantage for pirates  ... 
doi:10.1117/12.435408 dblp:conf/sswmc/FuronVD01 fatcat:aktia3an3vaovlas7cjfwb23wa

An asymmetric image watermarking scheme resistant against geometrical distortions

Dariusz Bogumił
2006 Signal processing. Image communication  
In this paper, a novel asymmetric public-key watermarking scheme is proposed. The watermark is embedded with the use of a private key, while the decoding uses only simple public key.  ...  The asymmetric watermark carries certain number of bits of information.  ...  Every watermarking system where the detection can be public is insecure, as an attacker can modify the image until the decoder shows no watermark or a different watermark.  ... 
doi:10.1016/j.image.2005.06.005 fatcat:pwuxxo6h2rejfds4qgisnkouv4

A general framework for robust watermarking security

Mauro Barni, Franco Bartolini, Teddy Furon
2003 Signal Processing  
The analysis of the security of watermarking algorithms has received increasing attention since it has been recognized that the sole investigation of robustness issues is not enough to properly address  ...  By considering the amount of information the attacker has about the watermarking algorithm, we introduce the notion of fair and un-fair attacks, so to ease the classiÿcation of di erent systems and attacks  ...  This is why public-detection watermarking is usually referred to as asymmetric watermarking.  ... 
doi:10.1016/s0165-1684(03)00168-3 fatcat:lbsiop66nrbfzg2lo3gmve7ncy

On The Implementation Of Asymmetric Fingerprinting Protocol

Minoru Kuribayashi, Masakatu Morii
2008 Zenodo  
Publication in the conference proceedings of EUSIPCO, Lausanne, Switzerland, 2008  ...  In order to achieve such an asymmetric property, the homomorphic property of public-key cryptosystems is introduced in the fingerprinting protocols [5, 6, 7] .  ...  In fingerprinting techniques, the original content may be available at a detection because a seller is assumed an author, or a sales agent who knows it.  ... 
doi:10.5281/zenodo.40808 fatcat:tlkocukeebfchc2kp4vm762c7a

A secure authentication watermarking for halftone and binary images

Hae Yong Kim, Amir Afif
2004 International journal of imaging systems and technology (Print)  
Authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image.  ...  The proposed technique seems to be the only binary/halftone watermarking scheme that can detect even a single pixel alteration in the host image. It can be used with secretkey or public-key ciphers.  ...  The proposed technique can be used in conjunction with a symmetric cipher (secret-key cryp-tography) or an asymmetric cipher (public-key cryptography) to detect any alteration of the watermarked image,  ... 
doi:10.1002/ima.20018 fatcat:3k3otpntrvf3rnuhfjjxhpyq54

Advanced techniques for dispute resolving and authorship proofs on digital works

Andre Adelsbach, Ahmad-Reza Sadeghi, Edward J. Delp III, Ping W. Wong
2003 Security and Watermarking of Multimedia Contents V  
As solutions, we propose dispute resolving schemes based on zero-knowledge watermark detection and asymmetric watermarking schemes.  ...  of digital watermarks.  ...  An asymmetric watermarking scheme is called robust, iff it is computationally infeasible for an adversary, given a watermarked work W , the watermark WM and the public detection/extraction key K Det/Ext  ... 
doi:10.1117/12.477295 dblp:conf/sswmc/AdelsbachS03 fatcat:355et7pc3jgcnab2a7ltlj7sv4

Asymmetric Fragile Watermarking Using a Number Theoretic Transform

Hideaki TAMORI, Tsuyoshi YAMAMOTO
2009 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
We propose an asymmetric fragile watermarking technique that uses a number theoretic transform (NTT).  ...  The effectiveness of the proposed method is evaluated by simulated detection of altering. key words: number theoretic transform, asymmetric watermarking, fragile watermarking, image authentication  ...  In this paper, we propose an asymmetric fragile watermarking technique using the NTT. This technique can release a public key, which cannot be used to update the watermarking [3] .  ... 
doi:10.1587/transfun.e92.a.836 fatcat:pu6nc4lup5dibees2ioo7w7daa

An asymmetric subspace watermarking method for copyright protection

Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern
2005 IEEE Transactions on Signal Processing  
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark.  ...  It allows for the public release of all information, except the secret key.  ...  If the oracle attack on an asymmetric watermarking method is successful, it will disclose the detection key, which is already public.  ... 
doi:10.1109/tsp.2004.839921 fatcat:daihcikmmnbpfnd7rnmxpjnvle
« Previous Showing results 1 — 15 out of 1,221 results