© The Institution of Engineering and Technology
An asymmetric watermarking algorithm is presented, involving a private key for embedding and a public key for detection, joint with a suitable encryption scheme, thus achieving a double security level for digital data protection. A commutative scheme is designed based on linear algebra and on a secret random permutation, allowing both to cipher watermarked data and to mark encrypted data without interfering with the watermark detection process.
References
-
-
1)
-
G. Boato ,
F.G.B. De Natale ,
C. Fontanari
.
An improved asymmetric watermarking scheme suitable for copy protection.
IEEE Trans. Signal Process.
,
7 ,
2833 -
2834
-
2)
-
S. Lian ,
Z. Liu ,
H. Wang
.
Commutative encryption and watermarking in video compression.
IEEE Trans. Circuits Syst. Video Technol.
,
6 ,
774 -
778
-
3)
-
Boato, G., Conotter, V., De Natale, F.G.B., Fontanari, C.: `A joint asymmetric watermarking and image encryption scheme', Proc. IS&T/SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, January 2008.
-
4)
-
Cox, I.J., Doerr, G., Furon, T.: `Watermarking is not cryptography', Proc. Int. Workshop on Digital Watermarking 2006, , p. 1–15, LNCS 4283.
-
5)
-
Sadeghi, A.-R.: `The marriage of cryptography and watermarking-beneficial and challenging for secure watermarking and detection', Proc. Int. Workshop on Digital Watermarking 2007, , p. 2–18.
http://iet.metastore.ingenta.com/content/journals/10.1049/el_20080492
Related content
content/journals/10.1049/el_20080492
pub_keyword,iet_inspecKeyword,pub_concept
6
6