A cryptographic watermarking technique for multimedia signals

  • PDF / 685,483 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 38 Downloads / 183 Views

DOWNLOAD

REPORT


A cryptographic watermarking technique for multimedia signals Jian Ren

Received: 17 November 2007 / Accepted: 9 May 2008 / Published online: 20 August 2008 © Springer Science + Business Media, LLC 2008

Abstract Digital watermarking has been widely used in digital rights management and copyright protection. In this paper, new cryptographic watermark schemes are proposed. Compare to the existing watermarking techniques, our proposed watermark schemes combine both security and efficiency that none of the existing schemes can do. We first develop an algorithm to randomly generate the watermark indices based on the discrete logarithm problem (DLP) and the Fermat’s little theorem. Then we embed watermark signal into the host image in both time domain and frequency domain at the indices. Our security analysis and simulation demonstrate that our proposed schemes can achieve excellent transparency and robustness under the major security attacks and common signal degradations. The novel approaches provided in this paper are ideal for general purpose commercial digital media copyright protection. Keywords Data hiding · Information embedding · Watermarking · Cryptography Mathematics Subject Classification (2000) 68W99

1 Introduction Advances in computer networking and high speed computer processors have made duplication and distribution of multimedia data easy and virtually cost-

Communicated by Lixin Shen and Yuesheng Xu. J. Ren (B) Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48824, USA e-mail: [email protected]

268

J. Ren

less, and have also made copyright protection of digital media an ever urgent challenge. As an effective way for copyright protection, digital watermarking, a process which embeds (hides) a watermark signal in the host signal to be protected, has attracted more and more research attention [1–8]. The host signals are usually images, video or audio signals that are distributed in digital format. The watermark is desired to reside in the host signal permanently to provide copyright protection, license restriction, owner identification, content authentication, and traitor tracing [1]. The framework of watermarking can be depicted as in Fig. 1 [9, 10], in which a watermark signal w is embedded in the host signal h. The embedding is performed using a cryptographic key or the side information about the host signal. The resulted watermarked data may be subjected to both channel distortion and security attacks that attempt to remove or destroy the embedded watermark. Watermark extraction is the inverse process of watermark embedding. It can be performed either with or without access to the original signal, the later case is called blind watermark extraction [1, 11] and is especially useful when the host signal is not available. Compare to its non-blind counterpart, blind watermark extraction is generally more challenging and often has limited extraction capability, hence limits the amount of embedded data. The digital watermark embedding system needs to sati