The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A comparative study of digital watermarking in JPEG and JPEG 2000 environments
Information Sciences—Informatics and Computer Science: An International Journal
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
Information Sciences: an International Journal
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
Robust watermarking and compression for medical images based on genetic algorithms
Information Sciences: an International Journal
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Robust image-adaptive data hiding using erasure and error correction
IEEE Transactions on Image Processing
Fingerprinting protocol for images based on additive homomorphic property
IEEE Transactions on Image Processing
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
An improved algorithm for reversible data hiding in encrypted image
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.07 |
In most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor's identity can be traced by the embedded watermark. However, it incurs both repudiation issue and framing issue. To solve these problems, some buyer-seller watermarking protocols have been proposed based on watermarking scheme in the encrypted domain. In this paper, an enhanced watermarking scheme is presented. Compared with Solanki et al.'s scheme, the enhanced scheme increases effective watermarking capacity, avoids additional overhead and overcomes an inherent flaw that watermarking capacity depends on the probability distribution of input watermark sequence. Based on the security requirements of buyer-seller watermarking protocols, a new watermarking scheme in the encrypted domain with flexible watermarking capacity is proposed. It improves the robustness of watermark sequence against image compressions and enables image tampering detection. Watermark extraction is blind, which employs the same threshold criterion and secret keys as watermark embedding. Experimental results demonstrate that the enhanced watermarking scheme eliminates the drawbacks of Solanki et al.'s scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme.