Research on public-key digital watermarking system

Author(s):  
Qingmei Wang ◽  
Fengyan Sun ◽  
Fengyu Liu
Author(s):  
Eberhard Stickel

Conventional photographs may easily be used in court as evidence. The complete negative may be inspected. Subsequent numbers are a reliable proof that sequences of pictures have been generated. Modifications are usually quickly detected without major technical efforts. This is not true anymore for digital images, since they may easily be manipulated. This poses a problem, for example, for surveillance cameras of automatic teller machines in financial institutions. Digital watermarking techniques have been proposed to address this problem. In this chapter, a new public-key watermarking system will be presented. In contrast to digital signatures and other public-key watermarking techniques, it is two-dimensional and, hence, especially well-suited for applications involving digital images.


2013 ◽  
Vol 32 (4) ◽  
pp. 971-975
Author(s):  
Li-zong LI ◽  
Qiao-lun GU ◽  
Tie-gang GAO

2012 ◽  
Vol 6-7 ◽  
pp. 452-458
Author(s):  
Jian Quan Xie ◽  
Qing Xie ◽  
Li Jun Tian

For protecting copyright of digital work, a kind of digital work commerce protocol is proposed based on RSA public key system. Digital fingerprint information that embedded in digital work can only be generated by the cooperation of the publisher and the user. The publisher cannot obtain this digital work, but the publisher can judge whether the fingerprint information exists in illegal copied digital work. This protocol can be utilized to trace and accuse the illegal piracy. Meanwhile, it can also protect legal user from framed by publishers. The digital fingerprint identification procedure that dispenses with participation of the third party can effectively avoid forgery in the procedure, which makes the scheme more convenient and safer than the scheme that needs the third party.


Author(s):  
Siva Charan Muraharirao ◽  
Manik Lal Das

The recent advances in multimedia technology demand protection of digital images from unintentional manipulation for content integrity, copyright, and ownership. Digital watermarking technique has wide acceptance in the industry for anti-piracy, ownership verification, and digital image authentication. There have been a large number of schemes in the literature proposed for digital watermarking using non-cryptographic and cryptographic primitives. Use of Least Significant Bits (LSB) is one of the oldest but classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security. Cryptographic primitives such as hash function, digital signature, and message authentication codes have been used in several applications including multimedia for data authentication. Digital signature-based image authentication provides strong security, but the approach requires managing public key infrastructure, which is a costly operation. Partial data protection is also an optimal approach for protecting important data while leaving unimportant data unprotected. Considering security weakness of the LSB-based approach and cost overhead of the public key-based approach, the authors present in this chapter a digital image authentication scheme using LSB, keyed hash, and partial encryption. They show that the proposed watermarking scheme is secure and efficient in comparison to other related schemes.


2008 ◽  
pp. 1257-1266
Author(s):  
Eberhard Stickel

Conventional photographs may easily be used in court as evidence. The complete negative may be inspected. Subsequent numbers are a reliable proof that sequences of pictures have been generated. Modifications are usually quickly detected without major technical efforts. This is not true anymore for digital images, since they may easily be manipulated. This poses a problem, for example, for surveillance cameras of automatic teller machines in financial institutions. Digital watermarking techniques have been proposed to address this problem. In this chapter, a new public-key watermarking system will be presented. In contrast to digital signatures and other public-key watermarking techniques, it is two-dimensional and, hence, especially well-suited for applications involving digital images.


2013 ◽  
Vol 5 (1) ◽  
pp. 18-23
Author(s):  
L. Venkateswarlu ◽  
◽  
Dr. N V Rao ◽  

Sign in / Sign up

Export Citation Format

Share Document