A publicly verifiable copyright-proving scheme resistant to malicious attacks

被引:89
作者
Chen, TH [1 ]
Horng, GB
Lee, WB
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
[2] Feng Chia Univ, Dept Informat Engn, Taichung 407, Taiwan
关键词
copyright protection; digital signature; digital timestamp; digital watermarking; discrete wavelet transform;
D O I
10.1109/TIE.2004.841083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed in this paper. The scheme is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks. The proposed scheme is also resistant to StirMark and unZign attacks and it is not only a robust method but also a lossless one. Experiments are conducted to show the robustness of this method. Moreover, cryptographic tools, such as digital signature and timestamp, are introduced to make copyright proving publicly verifiable.
引用
收藏
页码:327 / 334
页数:8
相关论文
共 21 条
  • [1] Improved wavelet-based watermarking through pixel-wise masking
    Barni, M
    Bartolini, F
    Piva, A
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) : 783 - 791
  • [2] An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    Chang, CC
    Chuang, JC
    [J]. PATTERN RECOGNITION LETTERS, 2002, 23 (08) : 931 - 941
  • [3] Removing multiple redundancies in combinational circuits
    Chang, SC
    Cheng, DI
    Yeh, CW
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2002, 149 (01): : 1 - 8
  • [4] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [5] Craver S, 1998, COMMUN ACM, V41, P44, DOI 10.1145/278476.278486
  • [6] Public key watermarking for authentication of CSG models
    Fornaro, C
    Sanna, A
    [J]. COMPUTER-AIDED DESIGN, 2000, 32 (12) : 727 - 735
  • [7] Hidden digital watermarks in images
    Hsu, CT
    Wu, JL
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) : 58 - 68
  • [8] Multiresolution watermarking for digital images
    Hsu, CT
    Wu, JL
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 1998, 45 (08) : 1097 - 1101
  • [9] On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
    Katzenbeisser, S
    [J]. 12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2001, : 815 - 819
  • [10] The watermark copy attack
    Kutter, M
    Voloshynovskiy, S
    Herrigel, A
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 371 - 380