Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2002.9C.1.001

A Digital Image Watermarking Scheme using ElGamal Function  

Lee, Jean-Ho (Dept.of Computer Sceince, Graduate School of Korea University)
Kim, Tai-Yun (Dept.of Computer Sceince, Korea University)
Abstract
Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.
Keywords
Steganography; Digital Watermarking; One-way Hash function; ElGamal function;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Aura, 'Practical Invisibility in Digital Communication,' Proceedings of Information Hiding Workshop, LNCS Vol. 1174, pp.265-278, Springer-Verlag, 1996   DOI   ScienceOn
2 Bloom, 'Copy Protection for DVD Video,' Proceedings of IEEE, Vol.87, No.7, July, 1999   DOI   ScienceOn
3 B. Chor, A. Fiat, M. Naor, 'Tracing Traitors,' Proceedings of Crypto'94, LNCS, Vol.839, pp.257-270, Springer-Verlag, 1994
4 N. Memon, P. W. Wong, 'Protecting Digital Media Content,' CACM, Vol.41 , No.7, pp.35-43, July, 1998   DOI
5 S. Craver, N. Memon, B. Yeo, 'Resolving Rightful Ownerships with Invisible Watermarking Techniques : Limitations, Attacks and Implications,' IEEE Journal of SAC, Vol.16, No.4, pp.573-586, May, 1998   DOI   ScienceOn
6 N. F. Johnson, S. Jajodia, 'Steganalysis of Images Created Using Current Steganography Software,' Proceedings of Information Hiding Workshop, LNCS Vol.1525, pp.273-289, Springer-Verlag, 1998   DOI
7 S. Katzenbeisser, F. A. P. Petiteolas, editor. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 1999
8 Eugene T. Lin, E. J. Delp, 'A Review of Data Hiding in Digital Images,' Proceedings of the Image Processing, Image Ouality, Image Capture Systems Conference'99, pp.274-278, April, 1999
9 R. C. Merkle, 'One-way Hash Functions and DES,' Proceedings of Crypto'89, LNCS Vol.435, pp.428-446, Springer-Verlag, 1989
10 M. Naor, O. Reingold, 'On the Construction Pseudorandom Permutations: Luby-Rackoff Revisited,' Journal of Cryptology, Vol.12, No.1, pp.29-66, 1999   DOI
11 E. Franz, A. Ierichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer Based Steganography : How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS Vol.1174, pp.7-21, Springer-Verlag, 1996   DOI   ScienceOn
12 R. J. Anderson, editor. Information hiding: first international workshop, LNCS Vol.1174, Springer-Verlag, May, 1996
13 T. ElGamal 'A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,' Proceedings of Crypto'84, LNCS Vol.196, pp.10-18, Springer-Verlag, 1985
14 M. Luby, C. Rackoff, 'How to Construct Pseudorandom Permutations from Pseudorandom Functions,' SIAM Journal on Computation, Vol.17, No.2, pp.373-386, 1988   DOI   ScienceOn