Secure Digital Watermarking Model with Side Information Theory and Cryptography

被引:0
|
作者
Xiao Jun [1 ]
Li Dengyu [1 ]
Wang Ying [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Engn Sci, Beijing 100049, Peoples R China
关键词
Secure Watermarking Model; Hostile attack; Cryptography; Side information;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The idea of side information is introduced into secure watermarking, and a secure watermarking model with side information theory and the idea of cryptography is proposed. In the proposed model, the side information from the cover work, the attack and the detector are considered and fully used in both the preprocessing stage and the embedding stage. With the guidance of the proposed model, we also give three security mechanisms resisting typical secure attacks, such as collusion attack, homology detection and copy attack, which belong to unauthorized removal, unauthorized detection and unauthorized embedding. The proposed security mechanisms show that the side information and encryption technology can be used to get good watermarking algorithms with higher security.
引用
收藏
页码:340 / 345
页数:6
相关论文
共 50 条
  • [41] Secure fragile digital watermarking technique for image authentication
    Alturki, F
    Mersereau, R
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1031 - 1034
  • [42] Digital watermarking based secure multimodal biometric system
    Vatsa, M
    Singh, R
    Mitra, P
    Noore, A
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 2983 - +
  • [43] Digital Watermarking Technology in Information Security
    Li, YingChun
    Zhao, LiFang
    [J]. ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 55 - 58
  • [44] Optimum information embedding in digital watermarking
    Rahman, Atta
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 553 - 564
  • [45] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196
  • [46] Review of Models, Issues and Applications of Digital Watermarking Based on Visual Cryptography
    Saturwar, J. H.
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 572 - 575
  • [47] Information theoretic aspects in digital watermarking
    Cappellini, V
    Bartolini, F
    Barni, M
    [J]. SIGNAL PROCESSING, 2001, 81 (06) : 1117 - 1119
  • [48] Identification in the presence of side information with application to watermarking
    Steinberg, Y
    Merhav, N
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) : 1410 - 1422
  • [49] Identification in the presence of side information with application to watermarking
    Steinberg, Y
    Merhav, N
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 45 - 45
  • [50] A secure image transmission scheme based on digital watermark and cryptography
    Wu, J
    Xia, BB
    Liu, J
    Tian, JW
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL SYMPOSIUM ON INTELLIGENT MULTIMEDIA, VIDEO AND SPEECH PROCESSING, 2004, : 278 - 281