• Article
  • | |
  • Metrics
  • |
  • Reference [12]
  • |
  • Related [20]
  • |
  • Cited by [3]
  • | |
  • Comments
    Abstract:

    Watermarking, as an effective method for information hidding, has evolved very quickly. Most watermarking systems available have only a secret key, which cannot be public. But in some applications, watermarking needs to be retrieved by public keys. How to generate public keys without weaken the performance of the private key is a key problem. In this paper, a secret key watermarking system is designed, in which a novel method of generating public keys is proposed. The identifier (ID) embedded can be reliably retrieved using public keys without resorting to the orginal data. Because only part of embedding information is used in public keys, the above problem is successfully solved. Expeimental results show its security and validity.

    Reference
    [1] Swanson, M.D., Zhu, Bin, Tewfik, A.H. Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communication, 1998,16(4):540~550.
    [2] Podilchuk, C.I., Zeng, Wen-jun. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communication, 1998,16(4):525~539.
    [3] Servetto, S., Podilchuk, C.I., Ramchandran, K. Capacity issues in digital image watermarking. In: Werner, B., ed. Proceedings of the 1998 International Conference on Image Processings, Vol 1. Chicago: Braun-Brum Field, Inc., 1998. 445~449.
    [4] Wolfgang, R.B., Podilchuk, C.I., Delp, E.J. Perceptual watermarks for digital image and video. Proceedings of the IEEE, 1999,87(7):1108~1126.
    [5] Hsu, Chiou-ting, Wu, Ja-ling. Hiding digital watermarks in image. IEEE Transactions on Image Processing, 1999,8(1):58~68.
    [6] Hartung, F., Kutter, M. Multimedia watermarking techniques. Proceedings of the IEEE, 1999,87(7):1079~1107.
    [7] Cox, I.J., Kilian, J., Leighton, F.T., et al. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997,6(12):1674~1687.
    [8] Hartung, F., Girod, B. Fast public-key watermarking of compressed video. In: Torwick, I., ed. Proceedings of the 1997 International Conference on Image Processing, Vol 1. Santa Barbara: Braun-Brum Field, Inc., 1997. 528~531.
    [9] Watermarking for DVD-Call for proposals. 1997. http://www.Dvcc.com/dhsg/.
    [10] Fornaro, C., Sanna, A. Public key watermarking for authentication of CSG models. Computer-Aided Design, 2000,32(12):727~735.
    [11] Marvel, L.M., Boncelet, C.G., Retter, C.T. Spread spectrum image steganography. IEEE Transactions on Image Processing, 1999,8(8):1075~1083.
    [12] Watson, A.B., Yang, G.Y., Solomon, J.A., et al. Visibility of wavelet quantization noise. IEEE Transactions on Image Processing, 1997,6(8):1164~1175.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

钟桦,焦李成,刘芳.一种新颖的水印密钥系统.软件学报,2001,12(9):1304-1311

Copy
Share
Article Metrics
  • Abstract:3958
  • PDF: 4605
  • HTML: 0
  • Cited by: 0
History
  • Received:December 15,2000
  • Revised:April 18,2001
You are the first2033411Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063