A publicly verifiable copyright-proving scheme resistant to malicious attacks

被引:93
作者
Chen, TH [1 ]
Horng, GB
Lee, WB
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
[2] Feng Chia Univ, Dept Informat Engn, Taichung 407, Taiwan
关键词
copyright protection; digital signature; digital timestamp; digital watermarking; discrete wavelet transform;
D O I
10.1109/TIE.2004.841083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed in this paper. The scheme is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks. The proposed scheme is also resistant to StirMark and unZign attacks and it is not only a robust method but also a lossless one. Experiments are conducted to show the robustness of this method. Moreover, cryptographic tools, such as digital signature and timestamp, are introduced to make copyright proving publicly verifiable.
引用
收藏
页码:327 / 334
页数:8
相关论文
共 21 条
[1]   Improved wavelet-based watermarking through pixel-wise masking [J].
Barni, M ;
Bartolini, F ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :783-791
[2]   An image intellectual property protection scheme for gray-level images using visual secret sharing strategy [J].
Chang, CC ;
Chuang, JC .
PATTERN RECOGNITION LETTERS, 2002, 23 (08) :931-941
[3]   Removing multiple redundancies in combinational circuits [J].
Chang, SC ;
Cheng, DI ;
Yeh, CW .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2002, 149 (01) :1-8
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
Craver S, 1998, COMMUN ACM, V41, P44, DOI 10.1145/278476.278486
[6]   Public key watermarking for authentication of CSG models [J].
Fornaro, C ;
Sanna, A .
COMPUTER-AIDED DESIGN, 2000, 32 (12) :727-735
[7]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[8]   Multiresolution watermarking for digital images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 1998, 45 (08) :1097-1101
[9]   On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking [J].
Katzenbeisser, S .
12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2001, :815-819
[10]   The watermark copy attack [J].
Kutter, M ;
Voloshynovskiy, S ;
Herrigel, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :371-380