Secure Asymmetric Watermarking Based on Correlation Detection


KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 3, pp. 379-386, Jun. 2005
10.3745/KIPSTC.2005.12.3.379,   PDF Download:

Abstract

Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
D. Li, J. W. Kim and J. U. Choi, "Secure Asymmetric Watermarking Based on Correlation Detection," KIPS Journal C (2001 ~ 2012) , vol. 12, no. 3, pp. 379-386, 2005. DOI: 10.3745/KIPSTC.2005.12.3.379.

[ACM Style]
De Li, Jong Weon Kim, and Jong Uk Choi. 2005. Secure Asymmetric Watermarking Based on Correlation Detection. KIPS Journal C (2001 ~ 2012) , 12, 3, (2005), 379-386. DOI: 10.3745/KIPSTC.2005.12.3.379.