Loading…
A practical version of Wong's watermarking technique
In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 2618 Vol. 4 |
container_issue | |
container_start_page | 2615 |
container_title | |
container_volume | 4 |
creator | Ouda, A.H. El-Sakka, M.R. |
description | In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one. |
doi_str_mv | 10.1109/ICIP.2004.1421639 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_1421639</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1421639</ieee_id><sourcerecordid>17612003</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3</originalsourceid><addsrcrecordid>eNpFkE1LxDAQhoMfYHf1B4iXXsRTayZJm-S4lFULC3pQPC5pOlmja1uTqvjvLVTwNId53pdnhpBzoDkA1dd1VT_kjFKRg2BQcn1AEsYVZKoQ-pAsqFSUq6IQ_IgkUDCWCaXoCVnE-Eopo8AhIWKVDsHY0VuzT78wRN93ae_S577bXcX024wY3k14890uHdG-dP7jE0_JsTP7iGd_c0mebtaP1V22ub-tq9Um84wWY4YGDHCupGuctiAFk20LiFphKZzUxpXN5CEdBW1bhsYyZFPCtU2jCm75klzOvYOJk58LprM-bofgJ6WfLcgSpvv5xF3MnEfE__X8Ff4LfM1TqQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A practical version of Wong's watermarking technique</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ouda, A.H. ; El-Sakka, M.R.</creator><creatorcontrib>Ouda, A.H. ; El-Sakka, M.R.</creatorcontrib><description>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 0780385543</identifier><identifier>ISBN: 9780780385542</identifier><identifier>EISSN: 2381-8549</identifier><identifier>DOI: 10.1109/ICIP.2004.1421639</identifier><language>eng</language><publisher>Piscataway NJ: IEEE</publisher><subject>Applied sciences ; Arithmetic ; Artificial intelligence ; Computer science ; Computer science; control theory; systems ; Computer security ; Data mining ; Equations ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Pattern recognition. Digital image processing. Computational geometry ; Public key ; Public key cryptography ; Resists ; Software ; Vector quantization ; Watermarking</subject><ispartof>2004 International Conference on Image Processing, 2004. ICIP '04, 2004, Vol.4, p.2615-2618 Vol. 4</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1421639$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54534,54899,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1421639$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17612003$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Ouda, A.H.</creatorcontrib><creatorcontrib>El-Sakka, M.R.</creatorcontrib><title>A practical version of Wong's watermarking technique</title><title>2004 International Conference on Image Processing, 2004. ICIP '04</title><addtitle>ICIP</addtitle><description>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</description><subject>Applied sciences</subject><subject>Arithmetic</subject><subject>Artificial intelligence</subject><subject>Computer science</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Data mining</subject><subject>Equations</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Resists</subject><subject>Software</subject><subject>Vector quantization</subject><subject>Watermarking</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>0780385543</isbn><isbn>9780780385542</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFkE1LxDAQhoMfYHf1B4iXXsRTayZJm-S4lFULC3pQPC5pOlmja1uTqvjvLVTwNId53pdnhpBzoDkA1dd1VT_kjFKRg2BQcn1AEsYVZKoQ-pAsqFSUq6IQ_IgkUDCWCaXoCVnE-Eopo8AhIWKVDsHY0VuzT78wRN93ae_S577bXcX024wY3k14890uHdG-dP7jE0_JsTP7iGd_c0mebtaP1V22ub-tq9Um84wWY4YGDHCupGuctiAFk20LiFphKZzUxpXN5CEdBW1bhsYyZFPCtU2jCm75klzOvYOJk58LprM-bofgJ6WfLcgSpvv5xF3MnEfE__X8Ff4LfM1TqQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Ouda, A.H.</creator><creator>El-Sakka, M.R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>A practical version of Wong's watermarking technique</title><author>Ouda, A.H. ; El-Sakka, M.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Arithmetic</topic><topic>Artificial intelligence</topic><topic>Computer science</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Data mining</topic><topic>Equations</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Resists</topic><topic>Software</topic><topic>Vector quantization</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Ouda, A.H.</creatorcontrib><creatorcontrib>El-Sakka, M.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ouda, A.H.</au><au>El-Sakka, M.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A practical version of Wong's watermarking technique</atitle><btitle>2004 International Conference on Image Processing, 2004. ICIP '04</btitle><stitle>ICIP</stitle><date>2004</date><risdate>2004</risdate><volume>4</volume><spage>2615</spage><epage>2618 Vol. 4</epage><pages>2615-2618 Vol. 4</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>0780385543</isbn><isbn>9780780385542</isbn><abstract>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</abstract><cop>Piscataway NJ</cop><pub>IEEE</pub><doi>10.1109/ICIP.2004.1421639</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1522-4880 |
ispartof | 2004 International Conference on Image Processing, 2004. ICIP '04, 2004, Vol.4, p.2615-2618 Vol. 4 |
issn | 1522-4880 2381-8549 |
language | eng |
recordid | cdi_ieee_primary_1421639 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Applied sciences Arithmetic Artificial intelligence Computer science Computer science control theory systems Computer security Data mining Equations Exact sciences and technology Memory and file management (including protection and security) Memory organisation. Data processing Pattern recognition. Digital image processing. Computational geometry Public key Public key cryptography Resists Software Vector quantization Watermarking |
title | A practical version of Wong's watermarking technique |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T16%3A51%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20practical%20version%20of%20Wong's%20watermarking%20technique&rft.btitle=2004%20International%20Conference%20on%20Image%20Processing,%202004.%20ICIP%20'04&rft.au=Ouda,%20A.H.&rft.date=2004&rft.volume=4&rft.spage=2615&rft.epage=2618%20Vol.%204&rft.pages=2615-2618%20Vol.%204&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=0780385543&rft.isbn_list=9780780385542&rft_id=info:doi/10.1109/ICIP.2004.1421639&rft_dat=%3Cpascalfrancis_6IE%3E17612003%3C/pascalfrancis_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1421639&rfr_iscdi=true |