Advertisement

Secure Client Side Watermarking with Limited Key Size

  • Jia-Hao Sun
  • Yu-Hsun Lin
  • Ja-Ling Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8935)

Abstract

In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.

Keywords

Cryptography Digital Right Management Watermarking Secure Client Side Watermarking Digital Content Delivering 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting—joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Anderson, R., Manifavas, C.: Chameleon – A new kind of stream cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  3. 3.
    Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Signal Processing 66(3), 357–372 (1998)CrossRefzbMATHGoogle Scholar
  4. 4.
    Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30(2), 87–96 (2013)CrossRefGoogle Scholar
  5. 5.
    Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Secure embedding of spread spectrum watermarks using look-up-tables. In: IEEE ICASSP 2007, vol. 2, pp. II-153–II-156 (April 2007)Google Scholar
  6. 6.
    Celik, M.U., Lemma, A.N., Katzenbeisser, S., van der Veen, M.: Lookup-table-based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. on Information Forensics and Security 3(3), 475–487 (2008)CrossRefGoogle Scholar
  7. 7.
    Hsu, C.-T., Wu, J.-L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)CrossRefGoogle Scholar
  8. 8.
    Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing 13(12), 1618–1626 (2004)CrossRefGoogle Scholar
  9. 9.
    Lemma, A., Katzenbeisser, S., Celik, M.U., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 433–445. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. on Information Forensics and Security 5(1), 187–193 (2010)CrossRefGoogle Scholar
  11. 11.
    Malvar, H.S., Florêncio, D.A.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898–905 (2003)CrossRefMathSciNetGoogle Scholar
  12. 12.
    Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)CrossRefzbMATHGoogle Scholar
  13. 13.
    Piva, A., Bianchi, T., De Rosa, A.: Secure client-side st-dm watermark embedding. IEEE Trans. on Information Forensics and Security 5(1), 13–26 (2010)CrossRefGoogle Scholar
  14. 14.
    Pun, C.L.P.C.-M., Jiang, J.-J., Chen: Adaptive client-side lut-based digital watermarking. In: IEEE TrustCom 2011, pp. 795–799 (November 2011)Google Scholar
  15. 15.
    Seok, J.W., Hong, J.-W.: Audio watermarking for copyright protection of digital audio data. Electronics Letters 37(1), 60–61 (2001)CrossRefGoogle Scholar
  16. 16.
    Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security 153(1), 15–18 (2006)CrossRefGoogle Scholar
  17. 17.
    Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. on Multimedia 15(2), 316–325 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Jia-Hao Sun
    • 1
  • Yu-Hsun Lin
    • 2
    • 3
  • Ja-Ling Wu
    • 1
    • 3
  1. 1.Dept. of CSIENational Taiwan UniversityTaiwan
  2. 2.Intel-NTU Connected Context Computing CenterTaiwan
  3. 3.GINMNational Taiwan UniversityTaiwan

Personalised recommendations