A watermarking technique based on one-way hash functions

被引:87
作者
Hwang, MS [1 ]
Chang, CC
Hwang, KF
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chaiyi, Taiwan
关键词
digital watermarks; intellectual property; copyright; cryptography;
D O I
10.1109/30.793411
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarking techniques have been proposed for the copyright protection of digital images recently. A digital watermarking technique is a technique for embedding invisible watermarks in a digital image. The watermarks must be designed to be unrecognizable by unauthorized people and to be identified by the legal copyright owner of the image. In this paper, we proposed a new copyright watermarking scheme. Our scheme is based on one-way hash functions, which are widely used in cryptosystems. The main goal of our method is to design a secure watermarking scheme.
引用
收藏
页码:286 / 294
页数:9
相关论文
共 26 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
BORKA JB, 1991, COMPUTER STANDARD IN, V12, P23
[3]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
COX LJ, 1998, IEEE J SEL AREA COMM, V16, P587
[6]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[7]   MORE ON MASTER KEYS FOR GROUP SHARING [J].
DENNING, DE ;
MEIJER, H ;
SCHNEIDER, FB .
INFORMATION PROCESSING LETTERS, 1981, 13 (03) :125-126
[8]   THE DESIGN OF A CRYPTOGRAPHY BASED SECURE FILE SYSTEM [J].
GUDES, E .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1980, 6 (05) :411-420
[9]  
HOUSLEY R, 1990, P 5 ANN COMP SEC APP, P29
[10]   A CONFERENCE KEY DISTRIBUTION-SYSTEM [J].
INGEMARSSON, I ;
TANG, DT ;
WONG, CK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1982, 28 (05) :714-720