Secure public digital watermarking detection scheme

被引:0
|
作者
Yanjun, Hao [1 ,2 ]
Guoqi, Bao [3 ]
Huanguo, Zhang [1 ,2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430079, Hubei, Peoples R China
[2] Wuhan Univ, State Key Lab Software Engn, Wuhan 430079, Hubei, Peoples R China
[3] Guangdong Prov Publ Secur Dept, Guangzhou 510050, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/CISP.2008.675
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the threats to watermarking security is unauthorized removal. In this paper, a framework based on extended Trusted Computer Platform to solve this problem was presented Using Trusted Computing Platform could enhance the security of watermarking detection. The TPM as a supervisor that control the watermark detection program and only the legal one can use the secret knowledge, that is, this secret knowledge bind with detection program in crypto format. This can ensure the whole scheme is secure although detection program is public. The security and feasibility about the framework was discussed, especially the resistant to Oracle attack Finally, it can be conclusion that a traditional watermarking scheme could get the capability of secure public detection after being transformed based on thisframework.
引用
收藏
页码:725 / 729
页数:5
相关论文
共 50 条
  • [31] A Novel Watermarking Scheme for Secure Relational Databases
    Tiwari, Rajesh Kumar
    Sahoo, G.
    INFORMATION SECURITY JOURNAL, 2013, 22 (03): : 105 - 116
  • [32] Dual Watermarking Scheme For Secure Buyer-Seller Watermarking Protocol
    Mehra, Neelesh
    Shandilya, Madhu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [33] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [34] Adaptive digital audio watermarking scheme
    Wang, X. Y.
    Fu, B.
    Zhao, H.
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 277 - 281
  • [35] A dual watermarking scheme of digital image
    Zhu, XD
    Yuan, SM
    Qi, LF
    Zhang, YL
    ACTIVE MEDIA TECHNOLOGY, 2003, : 303 - 308
  • [36] AN EFFICIENT DIGITAL IMAGE WATERMARKING SCHEME
    El-Iskandarani, M. A.
    Saad, Saad M.
    Abubahia, Ahmed. M.
    42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 37 - 42
  • [37] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [38] Watermarking scheme for copyright of digital images
    Baba, Sami
    Krekor, Lala
    Arif, Thawar
    Shaaban, Zyad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 1 - 9
  • [39] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [40] The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection
    Sadeghi, Ahmad-Reza
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 2 - 18