Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.3.379

Secure Asymmetric Watermarking Based on Correlation Detection  

Li De (상명대학교 컴퓨터과학과)
Kim JongWeon (상명대학교 디지털저작권보호연구센터)
Choi JongUk (상명대학교 소프트웨어대학)
Abstract
Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, has method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.
Keywords
Private Key; Public Key; Correlation Detection; Asymmetric;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. G. Van Schyndel, A. z. Tirkel, and I. D. Svalbe, 'Key independent watermark detection,' in Proc, of the IEEE Intl. Conf, on Multimedia Computing and Systems, Vol.1, pp.580-584, Florence, Italy, June, 1999   DOI
2 H. Choi, K, Lee, and T. Kim, 'Transformed-key asymmetric watermarking system,' in Proc. of SPIE: Security and Watermarkin of Multimedia Contents, Vol.4314, pp.280-289, San Jose, USA, Jan., 2001   DOI
3 Craver S, 'Zero knowledge watermark detection,' in International Workshop on Information Hiding (IHW'99), Lecture Notes in Computer Science 1768, pp.101-116, 1999
4 Adelsbach A, Sadeghi AR, 'Zero-Knowledge waterark detection and proof of ownership,' in International Worshop on Information Hiding (IHW'2001) Lecture Notes in Computer Sciece 2137, pp.273-288, 2001
5 Adelsbach a, Katzenbeisser S, Sadeghi AR, 'Cryptography meets watermarking detecting watermarks with minimal or zero knowledge disclosure,' in Proceedings of the European Signal Processing Conference (EUSIPCO'2002), Toulouse, France, September 3-6, 2002
6 Craver S, Katzenbeisser S, 'Copyright protection protocols based on asymmetric watermark : The ticket concept,' in Proceedings of the 6th Conference on Communication and Multimedia Security (CMS'01), pp.159-170, 2001
7 J. Picard and A. Robert, 'Neural Networks functions for public key watermarking,' in Workshop on Information Hiding, pp.142-156, Pittsburgh, PA, USA, Apr., 2001   DOI   ScienceOn
8 J. Smith and C. Dodge, 'Development in steganography,' in Workshop on Information Hiding, pp.77-87, Dresden, Germany, Oct., 1999
9 T. Furon and P. Duhamel,' An saymmetric public detection watermarking technique,' in Workshop on Information Hiding, pp.88-100, Dresden, Germany, Oct., 1999