Skip to main content

Asymmetric Watermarking Scheme Using Permutation Braids

  • Conference paper
Information Security Applications (WISA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2908))

Included in the following conference series:

Abstract

In this paper, we propose asymmetric watermarking system using permutation braids. Asymmetric watermarking system uses different keys for watermark embedding and detection. In such a scheme, the detector only needs to know a public key, which does not give enough information to make watermark removal possible. The proposed watermarking scheme can match requirements of asymmetric watermarking system. Our experimental result shows that this scheme provides security from any attempts to identify or remove the secret key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing, 1673–1687 (1997)

    Google Scholar 

  2. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)

    Google Scholar 

  3. Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proc. of European Signal Processing Conf., Tampere, Finland (2000)

    Google Scholar 

  4. Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Tagungsband des GI Workshops Sicherheit in Mediendaten, Berlin, Germany, pp. 107–123 (2000)

    Google Scholar 

  5. Furon, T., Duhamel, P.: Robustness of asymmetric watermarking technique. In: Proc. of the Int. Conf. on Image Processing, Vancouver, Canada (2000)

    Google Scholar 

  6. Picard, J., Robert, A.: On the Public Key Watermarking Issue. In: Proc. of SPIE, Security and Watermarking of Multimedia Contents III, pp. 290–299 (2001)

    Google Scholar 

  7. Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.S., Park, C.: New public-key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 166–183. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Swanson, M.D., Kobayasi, M., Tewfik, A.: Multimedia Data-Embedding and Watermarking Technologies. Proc. of IEEE (1998)

    Google Scholar 

  9. Hus, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Trans. on Image Processing, 58–56 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, GS., Kim, MA., Lee, WH. (2004). Asymmetric Watermarking Scheme Using Permutation Braids. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24591-9_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20827-3

  • Online ISBN: 978-3-540-24591-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics