Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Secure Client Side Watermarking with Limited Key Size

  • Conference paper
MultiMedia Modeling (MMM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8935))

Included in the following conference series:

  • 3769 Accesses

Abstract

In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting—joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Anderson, R., Manifavas, C.: Chameleon – A new kind of stream cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Signal Processing 66(3), 357–372 (1998)

    Article  MATH  Google Scholar 

  4. Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30(2), 87–96 (2013)

    Article  Google Scholar 

  5. Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Secure embedding of spread spectrum watermarks using look-up-tables. In: IEEE ICASSP 2007, vol. 2, pp. II-153–II-156 (April 2007)

    Google Scholar 

  6. Celik, M.U., Lemma, A.N., Katzenbeisser, S., van der Veen, M.: Lookup-table-based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. on Information Forensics and Security 3(3), 475–487 (2008)

    Article  Google Scholar 

  7. Hsu, C.-T., Wu, J.-L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)

    Article  Google Scholar 

  8. Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing 13(12), 1618–1626 (2004)

    Article  Google Scholar 

  9. Lemma, A., Katzenbeisser, S., Celik, M.U., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 433–445. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. on Information Forensics and Security 5(1), 187–193 (2010)

    Article  Google Scholar 

  11. Malvar, H.S., Florêncio, D.A.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  12. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)

    Article  MATH  Google Scholar 

  13. Piva, A., Bianchi, T., De Rosa, A.: Secure client-side st-dm watermark embedding. IEEE Trans. on Information Forensics and Security 5(1), 13–26 (2010)

    Article  Google Scholar 

  14. Pun, C.L.P.C.-M., Jiang, J.-J., Chen: Adaptive client-side lut-based digital watermarking. In: IEEE TrustCom 2011, pp. 795–799 (November 2011)

    Google Scholar 

  15. Seok, J.W., Hong, J.-W.: Audio watermarking for copyright protection of digital audio data. Electronics Letters 37(1), 60–61 (2001)

    Article  Google Scholar 

  16. Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security 153(1), 15–18 (2006)

    Article  Google Scholar 

  17. Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. on Multimedia 15(2), 316–325 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sun, JH., Lin, YH., Wu, JL. (2015). Secure Client Side Watermarking with Limited Key Size. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14445-0_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14444-3

  • Online ISBN: 978-3-319-14445-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics