Key-dependent pyramidal wavelet domains for secure watermark embedding

被引:2
|
作者
Dietl, WM [1 ]
Meerwald, P [1 ]
Uhl, A [1 ]
机构
[1] Salzburg Univ, Dept Comp Sci, A-5020 Salzburg, Austria
关键词
parametrized wavelet filters; watermarking; security; robustness;
D O I
10.1117/12.476817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wavelet filters can be parametrized to create an entire family of different wavelet filters. We discuss wavelet filter parametrization as a means to add security to wavelet based watermarking schemes. We analyze the influence of the number of filter parameters and use non-stationary multi-resolution decomposition where different wavelet filters are used at different levels of the decomposition. Using JPEG and JPEG2000 compression we assess the normalized correlation and Peak Signal to Noise Ratio (PSNR) behavior of the watermarks. The security against unauthorized detection is also investigated. We conclude that the proposed systems show good robustness against compression and depending on the resolution we choose for the parameters we get between 299 and 2185 possible keys.
引用
收藏
页码:728 / 739
页数:12
相关论文
共 50 条
  • [1] Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures
    Dietl, WM
    Uhl, A
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 2043 - 2046
  • [2] OAEP Is Secure under Key-Dependent Messages
    Backes, Michael
    Duermuth, Markus
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 506 - 523
  • [3] Construction of Key-dependent S-box for Secure Cloud Storage
    Indumathi, A.
    Sumathi, G.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1509 - 1524
  • [4] A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform
    Ou, Yang
    Rhee, Kyung Hyune
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 595 - +
  • [5] Efficient & secure cipher scheme with dynamic key-dependent mode of operation
    Noura, Hassan N.
    Chehab, Ali
    Couturier, Raphael
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 448 - 464
  • [6] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
  • [7] Assessing JPEG2000 encryption with key-dependent wavelet packets
    Engel, Dominik
    Stuetz, Thomas
    Uhl, Andreas
    EURASIP JOURNAL ON INFORMATION SECURITY, 2012, 2012 (01)
  • [8] Leakage-Resilient Key-Dependent Message Secure Encryption Schemes
    Gupta, Dhairya
    Rajasree, Mahesh Sreekumar
    Swaminathan, Harihar
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 : 234 - 257
  • [9] Cancelable Iris-Templates using Key-dependent Wavelet Transforms
    Haemmerle-Uhl, Jutta
    Pschernig, Elias
    Uhl, Andreas
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [10] A Key-dependent Cipher DSDP
    Chen, Like
    Zhang, Runtong
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 310 - 313