Abstract
In this paper, we propose asymmetric watermarking system using permutation braids. Asymmetric watermarking system uses different keys for watermark embedding and detection. In such a scheme, the detector only needs to know a public key, which does not give enough information to make watermark removal possible. The proposed watermarking scheme can match requirements of asymmetric watermarking system. Our experimental result shows that this scheme provides security from any attempts to identify or remove the secret key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing, 1673–1687 (1997)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)
Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proc. of European Signal Processing Conf., Tampere, Finland (2000)
Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Tagungsband des GI Workshops Sicherheit in Mediendaten, Berlin, Germany, pp. 107–123 (2000)
Furon, T., Duhamel, P.: Robustness of asymmetric watermarking technique. In: Proc. of the Int. Conf. on Image Processing, Vancouver, Canada (2000)
Picard, J., Robert, A.: On the Public Key Watermarking Issue. In: Proc. of SPIE, Security and Watermarking of Multimedia Contents III, pp. 290–299 (2001)
Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.S., Park, C.: New public-key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 166–183. Springer, Heidelberg (2000)
Swanson, M.D., Kobayasi, M., Tewfik, A.: Multimedia Data-Embedding and Watermarking Technologies. Proc. of IEEE (1998)
Hus, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Trans. on Image Processing, 58–56 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, GS., Kim, MA., Lee, WH. (2004). Asymmetric Watermarking Scheme Using Permutation Braids. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-24591-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20827-3
Online ISBN: 978-3-540-24591-9
eBook Packages: Springer Book Archive