A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Design of Rijndael
Tree-Structured Haar Transforms
Journal of Mathematical Imaging and Vision
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Improved Robust Watermarking in DCT Domain for Color Images
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
A Novel DCT-based Approach for Secure Color Image Watermarking
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Image Watermarking Based on Singular Value Decomposition
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
A Color Watermarking Scheme Based on Block-SVD and Arnold Transformation
DMAMH '07 Proceedings of the Second Workshop on Digital Media and its Application in Museum & Heritage
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Color Image Watermarking Using Multidimensional Fourier Transforms
IEEE Transactions on Information Forensics and Security
Commutative Encryption and Watermarking in Video Compression
IEEE Transactions on Circuits and Systems for Video Technology
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
Human visual system based data embedding method using quadtree partitioning
Image Communication
A new approach to commutative watermarking-encryption
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
A novel method for watermarking and ciphering color images, based on the joint use of a key-dependent wavelet transform with a secure cryptographic scheme, is presented. The system allows to watermark encrypted data without requiring the knowledge of the original data and also to cipher watermarked data without damaging the embedded signal. Since different areas of the proposed transform domain are used for encryption and watermarking, the extraction of the hidden information can be performed without deciphering the cover data and it is also possible to decipher watermarked data without removing the watermark. Experimental results show the effectiveness of the proposed scheme.