Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure

  • Authors:
  • Geruta Kazakevič/iū/tė/;Eugenijus Januš/kevič/ius;René/ Rosenbaum;Heidrun Schumann

  • Affiliations:
  • Dept. of Graphical Systems, Vilnius Gediminas Technical University, Saulė/tekio 11, LT-10223 Vilnius, Lithuania, e-mail: geruta@delfi.lt;CAAD Laboratory, Dept. of Architecture, Vilnius Gediminas Technical University, Trakuogon/ 1/26, LT-01132 Vilnius, Lithuania, e-mail: ejs@ar.vtu.lt;Institute of Computer Graphics, Dept. of CS, University of Rostock, Albert Einstein 21, D-18059 Rostock, Germany, e-mail: rrosen@informatik.uni-rostock.de, schumann@informatik.uni-rostock.de;Institute of Computer Graphics, Dept. of CS, University of Rostock, Albert Einstein 21, D-18059 Rostock, Germany, e-mail: rrosen@informatik.uni-rostock.de, schumann@informatik.uni-rostock.de

  • Venue:
  • Informatica
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used in existing image coding standards. In presented watermarking method the application of public key infrastructure is emphasized . We use PGP (Pretty Good Privacy) public key management scheme as the element for verification of sender's identity and also place of storing and retrieval of watermark detection keys. The most public key watermarking schemes use new, independent and cryptologically unverified keys. The reuse existing key verification and exchange infrastructure provides us cryptologically strong and verified keys.