Share Email Print
cover

Proceedings Paper

A joint asymmetric watermarking and image encryption scheme
Author(s): G. Boato; V. Conotter; F. G. B. De Natale; C. Fontanari
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.

Paper Details

Date Published: 18 March 2008
PDF: 8 pages
Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191A (18 March 2008); doi: 10.1117/12.765344
Show Author Affiliations
G. Boato, Univ. of Trento (Italy)
V. Conotter, Univ. of Trento (Italy)
F. G. B. De Natale, Univ. of Trento (Italy)
C. Fontanari, Politecnico di Torino (Italy)


Published in SPIE Proceedings Vol. 6819:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Edward J. Delp; Ping Wah Wong; Jana Dittmann; Nasir D. Memon, Editor(s)

© SPIE. Terms of Use
Back to Top