Secret key watermarking with changing keys

被引:0
|
作者
Depovere, G [1 ]
Kalker, T [1 ]
机构
[1] Philips Res, NL-5656 AA Eindhoven, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payload to identify the particular embedder. However, it is generally accepted that for security reasons, each embedder should better have its own secret key. A major drawback of this last approach is related to the detector implementation complexity, which increases linearly with the number of embedders. In this paper it is shown that this drawback can be overcome by changing the key in the watermarking system dependant on features of the incoming signal.
引用
收藏
页码:427 / 429
页数:3
相关论文
共 50 条
  • [31] Skeleton Keys The Secret Life of Bone
    Tattersall, Ian
    SCIENCE, 2019, 363 (6432) : 1156 - 1156
  • [32] Secret Keys from Channel Noise
    Ahmadi, Hadi
    Safavi-Naini, Reihaneh
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 266 - 283
  • [33] SKELETON KEYS The Secret Life of Bone
    George, Rose
    NEW YORK TIMES BOOK REVIEW, 2019, 124 (14): : 9 - 9
  • [34] 4(Secret) Keys to Student Engagement
    Jackson, Robyn
    Zmuda, Allison
    EDUCATIONAL LEADERSHIP, 2014, 72 (01) : 18 - 24
  • [35] IoT-pskts: Public and secret key with token sharing algorithm to prevent keys leakages in IoT
    Pradeepa K.
    Parveen M.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 797 - 812
  • [36] Multipurpose watermarking algorithm for secret communication
    Lu, ZM
    Li, SZ
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 79 - 84
  • [37] Predicting secret keys via branch prediction
    Aciicmez, Onur
    Koc, Cetin Kaya
    Seifert, Jean-Pierre
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 225 - +
  • [38] Broadcast Channel with Confidential Messages and Secret Keys
    Iyer, Krishnamoorthy
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [39] Extracting secret keys from integrated circuits
    Lim, D
    Lee, JW
    Gassend, B
    Suh, GE
    van Dijk, M
    Devadas, S
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (10) : 1200 - 1205
  • [40] Protecting secret keys in a compromised computational system
    Mitchell, WPR
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 448 - 462