Secure Digital Watermarking Model with Side Information Theory and Cryptography

被引:0
|
作者
Xiao Jun [1 ]
Li Dengyu [1 ]
Wang Ying [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Engn Sci, Beijing 100049, Peoples R China
关键词
Secure Watermarking Model; Hostile attack; Cryptography; Side information;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The idea of side information is introduced into secure watermarking, and a secure watermarking model with side information theory and the idea of cryptography is proposed. In the proposed model, the side information from the cover work, the attack and the detector are considered and fully used in both the preprocessing stage and the embedding stage. With the guidance of the proposed model, we also give three security mechanisms resisting typical secure attacks, such as collusion attack, homology detection and copy attack, which belong to unauthorized removal, unauthorized detection and unauthorized embedding. The proposed security mechanisms show that the side information and encryption technology can be used to get good watermarking algorithms with higher security.
引用
收藏
页码:340 / 345
页数:6
相关论文
共 50 条
  • [1] Secure Fragile Watermarking Algorithm with Side Information
    Zhang, Ying
    Xiao, Jun
    Wang, Ying
    Dd, Yan
    [J]. ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 41 - 44
  • [2] Digital watermarking: A communications with side information perspective
    Lu, CS
    Liao, HYM
    [J]. ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 927 - 932
  • [3] A Dynamic Security Model for Visual Cryptography and Digital Watermarking
    Chitra, K.
    Venkatesan, V. Prasanna
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 351 - 357
  • [4] The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection
    Sadeghi, Ahmad-Reza
    [J]. DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 2 - 18
  • [5] A secure transaction model based on digital steganography and watermarking
    Yin, KK
    Pan, ZG
    Xiang, H
    Shi, JY
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
  • [6] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [7] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [8] Combining Cryptography and Watermarking to Secure Revocable Iris Templates
    Fouad, Marwa
    El Saddik, Abdulmotaleb
    Zhao, Jiying
    Petriu, Emil
    [J]. 2011 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2011, : 1734 - 1737
  • [9] Secure Client-Side Digital Watermarking Using Optimal Key Selection
    Jiang, Jing-Jing
    Pun, Chi-Man
    [J]. COMMUNICATION AND NETWORKING, PT II, 2011, 266 : 162 - 168
  • [10] Secure arrays for digital watermarking
    Tirkel, AZ
    van Schyndel, RG
    Hall, TE
    Osborne, CF
    [J]. FOURTEENTH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1 AND 2, 1998, : 1643 - 1645