Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications

Secure Digital Watermarking Model with Side Information Theory and Cryptography

Authors
Jun Xiao, Dengyu Li, Ying Wang
Corresponding Author
Jun Xiao
Available Online August 2015.
DOI
10.2991/meita-15.2015.63How to use a DOI?
Keywords
Secure Watermarking Model; Hostile attack; Cryptography; Side information
Abstract

The idea of side information is introduced into secure watermarking, and a secure watermarking model with side information theory and the idea of cryptography is proposed. In the proposed model, the side information from the cover work, the attack and the detector are considered and fully used in both the preprocessing stage and the embedding stage. With the guidance of the proposed model, we also give three security mechanisms resisting typical secure attacks, such as collusion attack, homology detection and copy attack, which belong to unauthorized removal, unauthorized detection and unauthorized embedding. The proposed security mechanisms show that the side information and encryption technology can be used to get good watermarking algorithms with higher security.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
Series
Advances in Engineering Research
Publication Date
August 2015
ISBN
978-94-6252-103-2
ISSN
2352-5401
DOI
10.2991/meita-15.2015.63How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jun Xiao
AU  - Dengyu Li
AU  - Ying Wang
PY  - 2015/08
DA  - 2015/08
TI  - Secure Digital Watermarking Model with Side Information Theory and Cryptography
BT  - Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
PB  - Atlantis Press
SP  - 340
EP  - 345
SN  - 2352-5401
UR  - https://doi.org/10.2991/meita-15.2015.63
DO  - 10.2991/meita-15.2015.63
ID  - Xiao2015/08
ER  -