Skip to main content
Log in

A cryptographic watermarking technique for multimedia signals

  • Published:
Advances in Computational Mathematics Aims and scope Submit manuscript

Abstract

Digital watermarking has been widely used in digital rights management and copyright protection. In this paper, new cryptographic watermark schemes are proposed. Compare to the existing watermarking techniques, our proposed watermark schemes combine both security and efficiency that none of the existing schemes can do. We first develop an algorithm to randomly generate the watermark indices based on the discrete logarithm problem (DLP) and the Fermat’s little theorem. Then we embed watermark signal into the host image in both time domain and frequency domain at the indices. Our security analysis and simulation demonstrate that our proposed schemes can achieve excellent transparency and robustness under the major security attacks and common signal degradations. The novel approaches provided in this paper are ideal for general purpose commercial digital media copyright protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia data embedding and watermarking technologies. Proc. IEEE 86(6), 1064–1087 (June 1998)

    Article  Google Scholar 

  2. Hwang, M.-S., Chang, C.-C., Hwang, K.-F.: A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electron. 45(2), 286–294 (May 1999)

    Article  Google Scholar 

  3. Chen, B., Gornell, G.W.: Quantization index modulation: a class of probably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (May 2001)

    Article  MATH  Google Scholar 

  4. Malvar, H.S., Florêncio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Proc. 51(4), 898–905 (April 2003)

    Article  Google Scholar 

  5. Xie, L., Arce, G.R.: A class of authentication digital watermarks for secure multimedia communication. IEEE Trans. Image Proc. 10(11), 1754–1764 (November 2001)

    Article  MATH  Google Scholar 

  6. Tang, C.-W., Hang, H.-M.: A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Proc. 51(4), 950–959 (April 2003)

    Article  MathSciNet  Google Scholar 

  7. Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process 6(12), 1673–1687 (December 1997)

    Article  Google Scholar 

  8. Wang, S.-H., Lin, Y.-P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process 13(2), 154–165 (February 2004)

    Article  Google Scholar 

  9. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49(3), 563–593 (March 2003)

    Article  MATH  MathSciNet  Google Scholar 

  10. Moulin, P., Mihçak, M.: The parallel-Gaussian watermarking game. IEEE Trans. Inf. Theory 50(2), 272–289 (September 2004)

    Article  Google Scholar 

  11. Craver, S., Memon, N., Yeo, B., Yeung, M.: Can invisible watermarks resolve rightful ownerships? IBM Tech. Rep. RC 20509 (July 1996)

  12. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. Assoc. Comp. Mach. 21(2), 120–126 (1978)

    MATH  MathSciNet  Google Scholar 

  13. Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press (2000)

  14. Pérez-González, P., Balado, F., Martin, J.R.H.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans. Signal Proc. 51(4), 960–980 (April 2003)

    Article  Google Scholar 

  15. Moulin, P., Mihçak, M.: A framework of evaluating the data-hiding capacity of image sources. IEEE Trans. Image Process 11(9), 1029–1042 (September 2002)

    Article  Google Scholar 

  16. Chandramouli, R., Memon, N.D.: On sequential watermark detection. IEEE Trans. Signal Proc. 51(4), 1034–1044 (2003)

    Article  MathSciNet  Google Scholar 

  17. Kirovski, D., Petitcolas, F.A.: Blind pattern matching attack on watermarking systems. IEEE Trans. Signal Proc. 51(4), 1045–1053 (April 2003)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Ren.

Additional information

Communicated by Lixin Shen and Yuesheng Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ren, J. A cryptographic watermarking technique for multimedia signals. Adv Comput Math 31, 267–281 (2009). https://doi.org/10.1007/s10444-008-9096-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10444-008-9096-1

Keywords

Mathematics Subject Classification (2000)

Navigation