Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Pitfalls in Public Key Watermarking
SIBGRAPI '99 Proceedings of the XII Brazilian Symposium on Computer Graphics and Image Processing
Optimal Security Proofs for PSS and Other Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
Distortion-Free Data Embedding for Images
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem
ICPP '99 Proceedings of the 1999 International Workshops on Parallel Processing
Invertible Authentication Watermark for JPEG Images
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On subliminal channels in deterministic signature schemes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
IEEE Transactions on Multimedia
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
With some difficulty in making more redundant capacity, only a symmetrically encrypted hash code is embedded in some reversible watermarking schemes, which makes it possible that a dishonest verifier fabricates legal contents. This paper shows that for reversible watermarking, by exploiting a subliminal channel, only a capacity of several more bytes than the length of a hash code is needed to embed a longer public-key signature. Only 4 bytes more suffices in the research. To exemplify the idea, the paper gives a variant of the R-S watermarking scheme. The variant adopts the broad-band subliminal channel in RSA-PSS signature scheme. The analysis and experiments show that with the aid of the channel it is easier to implement the reversibility, localize the tampering, and so forth.