Abstract
The new watermarking technique presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the secret key used in the embedding process. It is the translation, in the watermarking domain, of a public key pair cryptosystem. The key idea is to filter the pseudo-noise sequence before embedding it in the cover-content. Contrary to classical techniques, the heart of the detection algorithm is not a correlation measure but a consistent statistical test hypothesis in spectral analysis. Some signal based considerations show that knowing the public key used in the detection process is no use for pirate who wants to discover the secret key. An example of a copyright protection system for digital content using this technique is briefly described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pfitzmann, B.: Information Hiding Terminology. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. In: Computer Sciences Applied Mathematics Engineering. CRC press, Boca Raton (1997)
Proakis, J.G.: Digital Communications, 3rd edn. Electrical Engineering Series. McGraw-Hill International Editions, New York (1995)
Smith, J.R., Comiskey, B.O.: Modulation and Information Hiding in Images. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)
O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing, May 1998 66(3) (1998)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proceedings of IEEE-ICIP 1996, Vol. III (October 1996)
Barni, M., Bartolini, F., Cappellini, V., Lippi, A., Piva, A.: A DWT-based Technique for Spatio-frequency Masking of Digital Signatures. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, January 1999, vol. 3657 (1999)
Dzhaparidze, K.: Parameter Estimation and Hypothesis Testing in Spectral Analysis of Stationary Time Series. Springer Series in Statistics. Springer, Heidelberg (1986)
Fukunaga, K.: Introduction to Statistical Pattern Recognition. In: Fukunaga, K. (ed.) Computer Science and Scientific Computing, 2nd edn. Academic Press, London (1990)
Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A VideoWatermarking System for Broadcast Monitoring. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, 3657 (January 1999)
Cox, I.J., Linnartz, J.P.: Some General Methods for Tampering with Watermark. IEEE Journal on Selected areas in communications 16(4) (May 1998)
Petitcolas, F.A.P., Anderson, R., Kuhn, M.: Attacks on copyright marking systems. In: Proceedings of the Second Int. Workshop on Information Hiding (April 1998)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust Audio watermarking using perceptual masking. Signal Processing 66(3) (May 1998)
Anderson, R.: Stretching the limits of steganography. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)
Knuth, D.: The art of computer programming. In: Addison-Wesley series in Computer Science and Information Processing, 2nd edn., vol. II (1981)
Donoho, D.: On minimum entropy deconvolution. 2nd edn. Findley Academic Press in Applied Time Series Analysis, (1981)
Hartung, F., Girod, B.: Fast Public-Key Watermarking of Compressed Video. In: Proceedings IEEE International Conference on Image Processing (October 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Furon, T., Duhamel, P. (2000). An Asymmetric Public Detection Watermarking Technique. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_7
Download citation
DOI: https://doi.org/10.1007/10719724_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive