Secret key watermarking with changing keys

被引:0
|
作者
Depovere, G [1 ]
Kalker, T [1 ]
机构
[1] Philips Res, NL-5656 AA Eindhoven, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payload to identify the particular embedder. However, it is generally accepted that for security reasons, each embedder should better have its own secret key. A major drawback of this last approach is related to the detector implementation complexity, which increases linearly with the number of embedders. In this paper it is shown that this drawback can be overcome by changing the key in the watermarking system dependant on features of the incoming signal.
引用
收藏
页码:427 / 429
页数:3
相关论文
共 50 条
  • [21] Dynamically changing the secret key of an FPGA chaos-based cipher
    Datcu, Octaviana
    Hobincu, Radu
    Petrica, Lucian
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2018, 21 (01): : 18 - 33
  • [22] The candidate key protocol for generating secret shared keys from similar sensor data streams
    Mayrhofer, Rene
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 1 - 15
  • [23] MSK-PK: A Public-Key Encryption Cryptosystem with Multiple Secret-Keys
    ZHAI Jiaqi
    LIU Jian
    CHEN Lusheng
    WANG Lingyu
    ChineseJournalofElectronics, 2022, 31 (04) : 764 - 772
  • [24] MSK-PK: A Public-Key Encryption Cryptosystem with Multiple Secret-Keys
    Zhai, Jiaqi
    Liu, Jian
    Chen, Lusheng
    Wang, Lingyu
    CHINESE JOURNAL OF ELECTRONICS, 2022, 31 (04) : 764 - 772
  • [25] Skeleton Keys: The Secret Life of Bone
    Zalasiewicz, Jan
    NATURE, 2019, 566 (7745) : 452 - 453
  • [26] Protecting secret keys with personal entropy
    Ellison, C
    Hall, C
    Milbert, R
    Schneier, B
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 311 - 318
  • [27] A new method for exchanging secret keys
    Stickel, E
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 426 - 430
  • [28] Authenticating Using Secret Key in Digital Video Watermarking Using 3-Level DWT
    Shoaib, Shaikh
    Mahajan, R. C.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATION, INFORMATION & COMPUTING TECHNOLOGY (ICCICT), 2015,
  • [29] Secret keys from quantum correlations
    Luetkenhaus, N.
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2006, 21 (1-2): : 29 - 37
  • [30] A Secure Image Watermarking Framework with Statistical Guarantees via Adversarial Attacks on Secret Key Networks
    Chen, Feiyu
    Lin, Wei
    Liu, Ziquan
    Chan, Antoni B.
    COMPUTER VISION - ECCV 2024, PT XL, 2025, 15098 : 428 - 445