Abstract
This paper proposes a zero-distortion authentication watermarking to produce a watermarked signal. Without a designated decoder/player, the watermarked signal can be shown with the same quality as the original one. To this end, the scheme replaces the original signal with its equivalence in the embedding process. As an exemplary application, this concept is employed to authenticate palette images by regulating their palettes. Because the visual appearance of the watermarked image is not modified, there is no need to reconstruct the original image at all. The idea is also used to provide the software integrity protection by re-arranging the software instructions or modules to embed the authentication message. Because the software control flow and data flow remain unchanged, the watermarked software is equivalent to the original software. On the other hand, the instruction positions in the watermarked software represent the authentication message used for verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)
Wong, P.W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Transactions on Image Processing 10, 1593–1601 (2001)
Domingo-Ferrer, J., Sebe, F.: Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images. In: International Conference on Information Technology: Coding and Computing, pp. 152–157 (2002)
Goljan, M., Fridrich, J., Rui, D.: Distortion-free Data Embedding. In: 4th Information Hiding Workshop (2001)
Fridrich, J., Goljan, M., Rui, D.: Lossless Authentication Watermark for JPEG Images. In: IEEE International Conference on Information Technology: Coding and Computing, pp. 223–227 (2001)
Wu, Y., Xu, C., Bao, F.: Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, ACS series conference in Research and Practice in Information Technology (2002), http://www.i2r.a-star.edu.sg/icsd/
Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding - New Paradigm in Digital Watermarking, Special Issue on Emerging Applications of Multimedia Data Hiding, 185–196 (2002)
Tian, J.: Wavelet-based Reversible Watermarking for Authentication, SPIE Security and Watermarking of Multimedia Content IV 4675, 679–690 (2002)
Goljan, M., Rui, D.: Invertible Authentication, SPIE Photonics West, vol. 3971, Security and Watermarking of Multimedia Contents III, 197–208 (2001)
Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible Data Hiding. In: International Conference on Image Processing (2002)
Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Localized Lossless Authentication Watermark (LAW). SPIE: Security and Watermarking of Multimedia Contents VÂ 5020(70) (2003)
Kwan, M.: Gifshuffle, http://www.darkside.com.au/gifshuffle/description.html
Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding For All Image Formats. SPIE Photonics West, Security and Watermarking of Multimedia Contents, 572–583 (2002)
Yang, Y., Bao, F.: An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas, ICASSP, III 533–536 (2003)
Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. Principles of Programming Languages (1999)
Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., Zhang, Y.: Experience with Software Watermarking. In: 16th Annual Computer Security Applications Conference, pp. 308–316 (2000)
Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (1999)
Davidson, R.L., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program. US Patent 5,559,884, Assignee: Microsoft Corp (1996)
Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management. IEEE Trans. on Multimedia 5(1), 97–105 (2003)
CompuServe Incorporated, Graphics Interchange Format (sm), http://members.aol.com/royalef/gif89a.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, Y. (2003). Zero-Distortion Authentication Watermarking. In: Boyd, C., Mao, W. (eds) Information Security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10958513_25
Download citation
DOI: https://doi.org/10.1007/10958513_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20176-2
Online ISBN: 978-3-540-39981-0
eBook Packages: Springer Book Archive