Digital Watermarking pp 191-203

Part of the Springer Topics in Signal Processing book series (STSP, volume 11) | Cite as

Security Enhancement of Digital Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Chapter

Abstract

This chapter discusses the security enhancement applications of digital watermarking in various technologies. Furthermore, the combination of watermarking technology with other computer security technologies such as biometric and cryptography is discussed. This chapter discusses the remaining issues in the digital watermarking science.

References

  1. 1.
    Donoho, D.L., et al. 2002. Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In Recent advances in intrusion detection. Springer.Google Scholar
  2. 2.
    Faundez-Zanuy, M., M. Hagmüller, and G. Kubin. 2006. Speaker verification security improvement by means of speech watermarking. Speech Communication 48(12): 1608–1619.Google Scholar
  3. 3.
    Faundez-Zanuy, M., M. Hagmüller, and G. Kubin. 2007. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40(11): 3027–3034.CrossRefMATHGoogle Scholar
  4. 4.
    Hämmerle-Uhl, J., K. Raab, and A. Uhl. 2011. Watermarking as a means to enhance biometric systems: A critical survey. In Information hiding. Springer.Google Scholar
  5. 5.
    Rekik, S., et al. 2012. Speech steganography using wavelet and Fourier transforms. EURASIP Journal on Audio, Speech, and Music Processing 2012(1): 1–14.CrossRefGoogle Scholar
  6. 6.
    Vatsa, M., R. Singh, and A. Noore. 2009. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27(3): 293–304.CrossRefGoogle Scholar
  7. 7.
    Bartlow, N., et al. 2007. Protecting iris images through asymmetric digital watermarking. In 2007 IEEE Workshop on automatic identification advanced technologies. IEEE.Google Scholar
  8. 8.
    Huber, R., H. Stögner, and A. Uhl. 2011. Two-factor biometric recognition with integrated tamper-protection watermarking. In Communications and multimedia security. Springer.Google Scholar
  9. 9.
    Satonaka, T. 2002. Biometric watermark authentication with multiple verification rule. In Proceedings of the 2002 12th IEEE workshop on neural networks for signal processing, 2002. IEEE.Google Scholar
  10. 10.
    Nematollahi, M.A., H. Gamboa-Rosales, F.J. Martinez-Ruiz, I. Jose, S.A.R. Al-Haddad, and M. Esmaeilpour. 2016. Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools and Applications, 1–31.Google Scholar
  11. 11.
    Lien, N.T.H. 2009. Echo hiding using exponential time-spread Echo Kernel and its applications to audio digital watermarking and speaker recognition. Tokyo Institute of Technology.Google Scholar
  12. 12.
    Yan, B., and Y.-J. Guo. 2013. Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia tools and applications 67(2): 383–405.CrossRefGoogle Scholar
  13. 13.
    Inamdar, V.S., and P.P. Rege. 2014. Dual watermarking technique with multiple biometric watermarks. Sadhana 39(1): 3–26.CrossRefGoogle Scholar
  14. 14.
    Vielhauer, C., et al. 2006. Multimodal speaker authentication–evaluation of recognition performance of watermarked references. In Proceedings of the 2nd workshop on multimodal user authentication (MMUA), Toulouse, France.Google Scholar
  15. 15.
    Zhe-Ming, L., Y. Bin, and S. Sheng-He. 2005. Watermarking combined with CELP speech coding for authentication. IEICE Transactions on Information and systems 88(2): 330–334.Google Scholar
  16. 16.
    Ratha, N.K., J.H. Connell, and R.M. Bolle. 2000. Secure data hiding in wavelet compressed fingerprint images. In Proceedings of the 2000 ACM workshops on multimedia. ACM.Google Scholar
  17. 17.
    Vatsa, M., et al. 2004. Comparing robustness of watermarking algorithms on biometrics data. In Proceedings of the workshop on biometric challenges from theory to practice-ICPR workshop.Google Scholar
  18. 18.
    Qi, M., et al. 2010. A novel image hiding approach based on correlation analysis for secure multimodal biometrics. Journal of Network and Computer Applications 33(3): 247–257.CrossRefGoogle Scholar
  19. 19.
    Fouad, M., A. El Saddik, and E. Petriu. 2010. Combining dwt and lsb watermarking to secure revocable iris templates. In 2010 10th International conference on information sciences signal processing and their applications (ISSPA). IEEE.Google Scholar
  20. 20.
    Khan, M.K., L. Xie, and J. Zhang. 2007. Robust hiding of fingerprint-biometric data into audio signals. In Advances in biometrics, 702–712. Springer.Google Scholar
  21. 21.
    Park, K.R., et al. 2007. A study on iris feature watermarking on face data. In Adaptive and natural computing algorithms, 415–423. Springer.Google Scholar
  22. 22.
    Noore, A., et al. 2007. Enhancing security of fingerprints through contextual biometric watermarking. Forensic Science International 169(2): 188–194.CrossRefGoogle Scholar
  23. 23.
    Arya, M.S., and R. Siddavatam. 2013. Geometric robust multimodal biometric watermarking scheme for copyright protection of digital images. International Journal of Computer Applications 72(9): 40–52.CrossRefGoogle Scholar
  24. 24.
    Vatsa, M., et al. 2006. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2): 23–28.CrossRefGoogle Scholar
  25. 25.
    Ghouzali, S. 2015. Watermarking based multi-biometric fusion approach. In Codes, cryptology, and information security, 342–351. Springer.Google Scholar
  26. 26.
    Sheetal Chaudhary, R.N. 2015. A new multimodal biometric recognition system integrating Iris, face and voice. International Journal of Advanced Research in Computer Science and Software Engineering. 5(4): 145–150.Google Scholar
  27. 27.
    Soltane, M., N. Doghmane, and N. Guersi. 2010. Face and speech based multi-modal biometric authentication. International Journal of Advanced Science and Technology 21(6): 41–56.Google Scholar
  28. 28.
    Wang, S., et al. 2013. Augmenting remote multimodal person verification by embedding voice characteristics into face images. In 2013 IEEE International conference on multimedia and expo workshops (ICMEW). IEEE.Google Scholar
  29. 29.
    Gordon, G. and W. Iii. 2008. Quantum watermarking by frequency of error when observing qubits in dissimilar bases.Google Scholar
  30. 30.
    Panah, A.S., R. van Schyndel, T. Sellis, and E. Bertino. 2016. On the properties of non-media digital watermarking: a review of state of the art techniques.Google Scholar
  31. 31.
    Lee, S.H. 2014. DWT based coding DNA watermarking for DNA copyright protection. Information Sciences 273: 263–286.CrossRefGoogle Scholar
  32. 32.
    Nakamoto, S. 2008. Bitcoin: a Peer-to-Peer Electronic Cash System. [Online]. http://www.cryptovest.co.uk/resources/Bitcoin%20paper%20Original.pdf.
  33. 33.
    Rosenfeld, M. 2012. Overview of colored coins, white paper. [Online]. https://bitcoil.co.il.
  34. 34.
    Leigh, D. 2016. A test bed for data hiding in financial transactions. [Online]. http://www.dylanleigh.net/portfolio/s3017239-summer-summary.pdf.
  35. 35.
    Petitcolas, F.A., R.J. Anderson, and M.G. Kuhn. 1998. Attacks on copyright marking systems. In Information hiding. Springer.Google Scholar
  36. 36.
    Voloshynovskiy, S., et al. 2001. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing 81(6): 1177–1214.CrossRefMATHGoogle Scholar
  37. 37.
    Kalker, T. 2001. Considerations on watermarking security. In 2001 IEEE Fourth Workshop on Multimedia Signal Processing. IEEE.Google Scholar
  38. 38.
    Petitcolas, F.A. (2004). Stirmark benchmark 4.0.Google Scholar
  39. 39.
    Craver, S., et al. 1998. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4): 573–586.CrossRefGoogle Scholar
  40. 40.
    Obaid, A.H. 2015. Information hiding techniques for steganography and digital watermarking. UDC 681.518 (04) INTERACTIVE S < STEMS: Problems of human-computer interaction. Collection of scientific papers, 306 p, 63. Ulyanovsk: USTU.Google Scholar
  41. 41.
    Chandramouli, R., M. Kharrazi, and N. Memon. 2003. Image steganography and steganalysis: Concepts and practice. In Digital watermarking, 35–49. Springer.Google Scholar
  42. 42.
    Linnartz, J.-P.M. and M. Van Dijk. 1998. Analysis of the sensitivity attack against electronic watermarks in images. In Information hiding. Springer.Google Scholar
  43. 43.
    Holliman, M., and N. Memon. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9(3): 432–441.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations