Browse > Article

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria  

Li De (상명대학교 디지털저작권보호연구센터)
Kim Jong-Weon (상명대학교 디지털저작권보호연구센터)
Choi Jong-Uk (상명대학교 소프트웨어대학)
Abstract
Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.
Keywords
correlation detection; critical criteria; hybrid detection; public key; asymmetric;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. G. Van Schyndel, A. z. Tirkel, and I. D. Svalbe, 'Key independent watermark detection,'in Proc, of the IEEE Intl. Conf, on Multimedia Computing and Systems, vol. 1, pp. 580-584, Florence, Italy, June 1999   DOI
2 H. Choi, K, Lee, and T. Kim, 'Transformedkey asymmetric watermarking system,' in Proc. of SPIE: Security and Watermarking of Multimedia Contents, vol. 4314, pp. 280-289, San Jose, USA, Jan. 2001
3 J. Smith and C. Dodge, 'Development in steganography,' in Workshop on Information Hiding, pp. 77-87, Dresden, Germany, Oct, 1999
4 Craver S, 'Zero knowledge watermark detection,' in International Workshop on Information Hiding (IHW'99), Lecture Notes in Computer Science 1768, pp. 101-116, 1999   DOI
5 Adelsbach A, Katzenbeisser S, Sadeghi AR, 'Cryptography meets watermarking detecting watermarks with minimal or zero knowledge disclosure,' in Proceedings of the European Signal Processing Conference (EUSIPCO' 2002), 2002
6 J. Picard and A. Robert, 'Neural Networks functions for public key watermarking,' in Workshop on Information Hiding, pp. 142-156, Pittsburgh, PA, USA, Apr, 2001
7 Craver S, Katzenbeisser S, 'Copyright protection protocols based on asymmetric watermark: The ticket concept,' in Proceedings of the 6th Conference on Communication and Multimedia Security (CMS'01), pp. 159-170, 2001
8 T. Furon and P. Duhamel, 'An asymmetric public detection watermarking technique,' in Workshop on Information Hiding, pp. 88-100, Dresden, Germany, Oct, 1999
9 Adelsbach A, Sadeghi AR, 'Zero-Knowledge watermark detection and proof of ownership,' in International Workshop on Information Hiding (IHW'2001) Lecture Notes in Computer Science 2137, pp. 273-288, 2001   DOI   ScienceOn