How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Fast multiresolution image querying
SIGGRAPH '95 Proceedings of the 22nd annual conference on Computer graphics and interactive techniques
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Fast public-key watermarking of compressed video
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Key Independent Watermark Detection
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Steganography in JPEG2000 compressed images
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Novel DWT video watermarking schema
Machine Graphics & Vision International Journal
Secure mutual distrust transaction tracking using cryptographic elements
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Hi-index | 0.00 |
The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used in existing image coding standards. In presented watermarking method the application of public key infrastructure is emphasized . We use PGP (Pretty Good Privacy) public key management scheme as the element for verification of sender's identity and also place of storing and retrieval of watermark detection keys. The most public key watermarking schemes use new, independent and cryptologically unverified keys. The reuse existing key verification and exchange infrastructure provides us cryptologically strong and verified keys.