Skip to main content

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol

  • Conference paper
  • 665 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4990))

Abstract

In most watermarking schemes for copyright protection, a seller always knows the embedded watermark identifying a buyer. However, it incurs both repudiation issue and framing issue. To solve these problems, many watermarking protocols have been proposed based on watermarking schemes in the encrypted domain. In this paper, we enhance an existing watermarking scheme and discuss public key cryptosystems used in watermarking protocols. Then, a new watermarking scheme in the encrypted domain with flexible watermarking capacity is proposed for watermarking protocol. It improves the robustness of watermarked image against JPEG compression after decryption and enables image tampering detection. The blind watermark extracting employs the same threshold criterion and secret keys as watermark embedding. Experimental results demonstrate that the enhanced scheme reduces computing overload and increases effective watermarking capacity, and that the proposed watermarking scheme in the encrypted domain outperforms a previous scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer’s rights. Journal of Visual Communication and Image Representation 3, 194–210 (1998)

    Article  Google Scholar 

  2. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Processing 4, 643–649 (2001)

    Article  Google Scholar 

  3. Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Processing 12, 1618–1626 (2004)

    Article  Google Scholar 

  4. Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceeding of Information Security 1, 15–18 (2006)

    Article  Google Scholar 

  5. Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing 12, 2129–2139 (2005)

    Article  Google Scholar 

  6. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Processing 4, 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  7. Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust Image-Adaptive Data Hiding Using Erasure and Error Correction. IEEE Trans. Image Processing 12, 1627–1639 (2004)

    Article  Google Scholar 

  8. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  9. Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Wallace, G.K.: The JPEG still picture compression standard. Communications of the ACM 4, 30–44 (1991)

    Article  MathSciNet  Google Scholar 

  11. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: FMCO 2004, vol. 3657(1), pp. 25–27 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dingyi Pei Moti Yung Dongdai Lin Chuankun Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, B., Dang, L., Kou, W., Zhang, J., Li, Z., Fan, K. (2008). A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79499-8_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79498-1

  • Online ISBN: 978-3-540-79499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics