Skip to main content

An Asymmetric Public Detection Watermarking Technique

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Abstract

The new watermarking technique presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the secret key used in the embedding process. It is the translation, in the watermarking domain, of a public key pair cryptosystem. The key idea is to filter the pseudo-noise sequence before embedding it in the cover-content. Contrary to classical techniques, the heart of the detection algorithm is not a correlation measure but a consistent statistical test hypothesis in spectral analysis. Some signal based considerations show that knowing the public key used in the detection process is no use for pirate who wants to discover the secret key. An example of a copyright protection system for digital content using this technique is briefly described.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pfitzmann, B.: Information Hiding Terminology. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)

    Google Scholar 

  2. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. In: Computer Sciences Applied Mathematics Engineering. CRC press, Boca Raton (1997)

    Google Scholar 

  3. Proakis, J.G.: Digital Communications, 3rd edn. Electrical Engineering Series. McGraw-Hill International Editions, New York (1995)

    Google Scholar 

  4. Smith, J.R., Comiskey, B.O.: Modulation and Information Hiding in Images. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)

    Google Scholar 

  5. O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing, May 1998  66(3) (1998)

    Google Scholar 

  6. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proceedings of IEEE-ICIP 1996, Vol. III (October 1996)

    Google Scholar 

  7. Barni, M., Bartolini, F., Cappellini, V., Lippi, A., Piva, A.: A DWT-based Technique for Spatio-frequency Masking of Digital Signatures. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, January 1999, vol. 3657 (1999)

    Google Scholar 

  8. Dzhaparidze, K.: Parameter Estimation and Hypothesis Testing in Spectral Analysis of Stationary Time Series. Springer Series in Statistics. Springer, Heidelberg (1986)

    Google Scholar 

  9. Fukunaga, K.: Introduction to Statistical Pattern Recognition. In: Fukunaga, K. (ed.) Computer Science and Scientific Computing, 2nd edn. Academic Press, London (1990)

    Google Scholar 

  10. Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A VideoWatermarking System for Broadcast Monitoring. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, 3657 (January 1999)

    Google Scholar 

  11. Cox, I.J., Linnartz, J.P.: Some General Methods for Tampering with Watermark. IEEE Journal on Selected areas in communications 16(4) (May 1998)

    Google Scholar 

  12. Petitcolas, F.A.P., Anderson, R., Kuhn, M.: Attacks on copyright marking systems. In: Proceedings of the Second Int. Workshop on Information Hiding (April 1998)

    Google Scholar 

  13. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  14. Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust Audio watermarking using perceptual masking. Signal Processing 66(3) (May 1998)

    Google Scholar 

  15. Anderson, R.: Stretching the limits of steganography. In: Proceedings of the First Int. Workshop on Information Hiding (May 1996)

    Google Scholar 

  16. Knuth, D.: The art of computer programming. In: Addison-Wesley series in Computer Science and Information Processing, 2nd edn., vol. II (1981)

    Google Scholar 

  17. Donoho, D.: On minimum entropy deconvolution. 2nd edn. Findley Academic Press in Applied Time Series Analysis, (1981)

    Google Scholar 

  18. Hartung, F., Girod, B.: Fast Public-Key Watermarking of Compressed Video. In: Proceedings IEEE International Conference on Image Processing (October 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Furon, T., Duhamel, P. (2000). An Asymmetric Public Detection Watermarking Technique. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_7

Download citation

  • DOI: https://doi.org/10.1007/10719724_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics