Skip to main content

Secure Watermark Embedding Through Partial Encryption

  • Conference paper
Book cover Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

Abstract

Secure watermark embedding allows to securely embed a watermark into a piece of content at an untrusted user device without compromising the security of the watermark key, the watermark or the original. In this paper, we show how secure embedding can be achieved by using traditional watermarking schemes in conjunction with partial encryption techniques, which were primarily developed to facilitate fast encryption of media content. Based on this concept, we develop two new efficient secure embedding mechanisms, one for the MASK watermarking scheme operating on baseband audio and one for a spread spectrum watermarking scheme operating on MPEG-2 encoded video streams.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting—joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Open Mobile Allowance. OMA digital rights management, http://www.openmobilealliance.org

  3. Anderson, R., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Crowcroft, J., Perkins, C., Brown, I.: A method and apparatus for generating multiple watermarked copies of an information signal. WO Patent No. 00/56059 (2000)

    Google Scholar 

  5. Emmanuel, S., Kankanhalli, M.S.: Copyright protection for MPEG-2 compressed broadcast video. In: ICME 2001. IEEE Int. Conf. on Multimedia and Expo., pp. 206–209 (2001)

    Google Scholar 

  6. Kundur, D.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6), 918–932 (2004)

    Article  Google Scholar 

  7. Lemma, A.N., Aprea, J., Oomen, W., van de Kerkhof, L.: A temporal domain audio watermarking technique. IEEE Transactions on Signal Processing 51(4), 1088–1097 (2003)

    Article  MathSciNet  Google Scholar 

  8. Lemma, A.N., Aprea, J., Oomen, W., Kerkhof, L.v.d.: A robustness and audibility analysis of a temporal envelope modulating audio watermark. In: IEEE DSP/SPE workshop proceedings, Gallaway Gardans, GA, USA, October 13-16 (2002)

    Google Scholar 

  9. Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. In: Proceedings of the International Federation for Information Processing, Communications and Multimedia Security Joint working conference IFIP TC6 and TC11, pp. 149–158 (2001)

    Google Scholar 

  10. Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. In: Protocols for Multimedia Systems (PROMS 2000), pp. 249–256 (2000)

    Google Scholar 

  11. Tomsich, P., Katzenbeisser, S.: Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 38–47. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Uhl, A., Pommer, A.: Image and Video Encryption, From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  13. van der Veen, M., Lemma, A., Kalker, A.A.C.: Electronic content delivery and forensic tracking. Multimedia Systems 11(2), 174–184 (2005)

    Article  Google Scholar 

  14. van der Veen, M., Lemma, A., Kalker, T.: Watermarking and fingerprinting for electronic music delivery. In: SPIE Workshop 2004, San Jose, CA, USA (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lemma, A., Katzenbeisser, S., Celik, M., van der Veen, M. (2006). Secure Watermark Embedding Through Partial Encryption. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_35

Download citation

  • DOI: https://doi.org/10.1007/11922841_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics