Secret key watermarking with changing keys

被引:0
|
作者
Depovere, G [1 ]
Kalker, T [1 ]
机构
[1] Philips Res, NL-5656 AA Eindhoven, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payload to identify the particular embedder. However, it is generally accepted that for security reasons, each embedder should better have its own secret key. A major drawback of this last approach is related to the detector implementation complexity, which increases linearly with the number of embedders. In this paper it is shown that this drawback can be overcome by changing the key in the watermarking system dependant on features of the incoming signal.
引用
收藏
页码:427 / 429
页数:3
相关论文
共 50 条
  • [1] Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys
    You, Jinkun
    Wang, Yuan-Gen
    Zhu, Guopu
    Wu, Ligang
    Zhang, Hongli
    Kwong, Sam
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 2459 - 2473
  • [2] A novel secret key watermarking system
    Zhong, H
    Liu, F
    Jiao, LC
    IMAGE COMPRESSION AND ENCRYPTION TECHNOLOGIES, 2001, 4551 : 121 - 126
  • [3] Novel secret key watermarking system
    Zhong, Hua
    Jiao, Li-Cheng
    Liu, Fang
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (09): : 1304 - 1311
  • [4] Management of secret keys: Dynamic key handling
    Daemen, J
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 264 - 276
  • [5] SECRET DISTRIBUTION OF KEYS FOR PUBLIC-KEY SYSTEMS
    QUISQUATER, JJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 203 - 208
  • [6] Secret Key Watermarking in WAV Audio file in Perceptual Domain
    Bibhu, Vimal
    Kushwaha, P. K.
    Kohli, Rashi
    Singh, Divya
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 641 - 646
  • [7] A New Symmetric Key Encryption Algorithm using Images as Secret Keys
    Islam, Mazhar
    Shah, Mohsin
    Khan, Zakir
    Mahmood, Toqeer
    Khan, Muhammad Jamil
    2015 13TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2015, : 1 - 5
  • [8] Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
    Fujioka, Atsushi
    Suzuki, Koutarou
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 121 - 141
  • [9] Generalized secret sharing and group-key distribution using short keys
    Mayer, A
    Yung, M
    COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, : 30 - 44
  • [10] Secret keys agreement in communication networks with quantum key distribution and trusted nodes
    Arbekov, I. M.
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2020, 17 (05)