Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Keyless Public Watermarking for Intellectual Property Authentication
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Adaptive Video Watermarking Scheme
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Robust non-interactive zero-knowledge watermarking scheme against cheating prover
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Secure multimedia authoring with dishonest collaborators
EURASIP Journal on Applied Signal Processing
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
An implementation of, and attacks on, zero-knowledge watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Information hiding in finite state machine
IH'04 Proceedings of the 6th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
Most watermarking techniques for images and video techniques involve a private key, for example a pseudo-noise signal, which is required for retrieval of the watermark information. This key is typically not public, because publication of the key would give rise to attacks on the watermark. In practical systems, however, watermarking techniques are required that enable public decoding of the watermark. In this paper, an extension of spread-spectrum watermarking is presented which enables public decoding and verification of the watermark, without at the same time giving the possibility of removing the watermark. The underlying idea, is to make only parts of the pseudo-noise key public. The scheme can be combined with a fast compressed-domain embedding technique to facilitate on-the-fly compressed-domain public-key watermarking.