Secret key watermarking with changing keys

被引:0
|
作者
Depovere, G [1 ]
Kalker, T [1 ]
机构
[1] Philips Res, NL-5656 AA Eindhoven, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payload to identify the particular embedder. However, it is generally accepted that for security reasons, each embedder should better have its own secret key. A major drawback of this last approach is related to the detector implementation complexity, which increases linearly with the number of embedders. In this paper it is shown that this drawback can be overcome by changing the key in the watermarking system dependant on features of the incoming signal.
引用
收藏
页码:427 / 429
页数:3
相关论文
共 50 条
  • [41] FOUR CAN KEEP A SECRET WITH QUANTUM KEYS
    不详
    NATURE, 2021, 594 (7863) : 305 - 305
  • [42] Encryption of speech signal with multiple secret keys
    Slimani, Dalila
    Merazka, Fatiha
    1ST INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE AND SPEECH PROCESSING, 2018, 128 : 79 - 88
  • [43] Sharing secret keys along a Eulerian circuit
    Mizuki, T
    Shizuya, H
    Nishizeki, T
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2000, 83 (04): : 33 - 42
  • [44] THE SECRET KEYS OF ISRAEL - FRENCH - GRAD,AD
    REIX, A
    REVUE PHILOSOPHIQUE DE LA FRANCE ET DE L ETRANGER, 1990, 115 (02): : 456 - 457
  • [45] Secure Broadcasting Using Independent Secret Keys
    Schaefer, Rafael F.
    Khisti, Ashish
    Poor, H. Vincent
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (02) : 644 - 661
  • [46] Five keys of the secret world of Remedios Varo
    Serrano, Julio
    CUADERNOS HISPANOAMERICANOS, 2016, (788) : 133 - 136
  • [47] False Secret Keys to Disturb Power Analysis
    Lee, Seungkwang
    Kim, Taesung
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 296 - 298
  • [48] Secret Keys in Genus-2 SIDH
    Kunzweiler, Sabrina
    Ti, Yan Bo
    Weitkaemper, Charlotte
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 483 - 507
  • [49] Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks
    Pfennig, Stefan
    Engelmann, Sabrina
    Franz, Elke
    Wolf, Anne
    PROCEEDINGS OF THE 2ND WORKSHOP ON COMMUNICATION SECURITY: CRYPTOGRAPHY AND PHYSICAL LAYER SECURITY, 2018, 447 : 15 - 32
  • [50] MULTIPLE WATERMARKING BASED ON VISUAL SECRET SHARING
    Chen, Tzung-Her
    Hung, Tsung-Hao
    Horng, Gwoboa
    Chang, Chia-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (11): : 3005 - 3026