Abstract
In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting—joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006)
Anderson, R., Manifavas, C.: Chameleon – A new kind of stream cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)
Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Signal Processing 66(3), 357–372 (1998)
Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30(2), 87–96 (2013)
Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Secure embedding of spread spectrum watermarks using look-up-tables. In: IEEE ICASSP 2007, vol. 2, pp. II-153–II-156 (April 2007)
Celik, M.U., Lemma, A.N., Katzenbeisser, S., van der Veen, M.: Lookup-table-based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. on Information Forensics and Security 3(3), 475–487 (2008)
Hsu, C.-T., Wu, J.-L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)
Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing 13(12), 1618–1626 (2004)
Lemma, A., Katzenbeisser, S., Celik, M.U., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 433–445. Springer, Heidelberg (2006)
Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. on Information Forensics and Security 5(1), 187–193 (2010)
Malvar, H.S., Florêncio, D.A.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898–905 (2003)
Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)
Piva, A., Bianchi, T., De Rosa, A.: Secure client-side st-dm watermark embedding. IEEE Trans. on Information Forensics and Security 5(1), 13–26 (2010)
Pun, C.L.P.C.-M., Jiang, J.-J., Chen: Adaptive client-side lut-based digital watermarking. In: IEEE TrustCom 2011, pp. 795–799 (November 2011)
Seok, J.W., Hong, J.-W.: Audio watermarking for copyright protection of digital audio data. Electronics Letters 37(1), 60–61 (2001)
Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security 153(1), 15–18 (2006)
Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. on Multimedia 15(2), 316–325 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sun, JH., Lin, YH., Wu, JL. (2015). Secure Client Side Watermarking with Limited Key Size. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-14445-0_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14444-3
Online ISBN: 978-3-319-14445-0
eBook Packages: Computer ScienceComputer Science (R0)