Loading…

A practical version of Wong's watermarking technique

In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in...

Full description

Saved in:
Bibliographic Details
Main Authors: Ouda, A.H., El-Sakka, M.R.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 2618 Vol. 4
container_issue
container_start_page 2615
container_title
container_volume 4
creator Ouda, A.H.
El-Sakka, M.R.
description In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.
doi_str_mv 10.1109/ICIP.2004.1421639
format conference_proceeding
fullrecord <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_1421639</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1421639</ieee_id><sourcerecordid>17612003</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3</originalsourceid><addsrcrecordid>eNpFkE1LxDAQhoMfYHf1B4iXXsRTayZJm-S4lFULC3pQPC5pOlmja1uTqvjvLVTwNId53pdnhpBzoDkA1dd1VT_kjFKRg2BQcn1AEsYVZKoQ-pAsqFSUq6IQ_IgkUDCWCaXoCVnE-Eopo8AhIWKVDsHY0VuzT78wRN93ae_S577bXcX024wY3k14890uHdG-dP7jE0_JsTP7iGd_c0mebtaP1V22ub-tq9Um84wWY4YGDHCupGuctiAFk20LiFphKZzUxpXN5CEdBW1bhsYyZFPCtU2jCm75klzOvYOJk58LprM-bofgJ6WfLcgSpvv5xF3MnEfE__X8Ff4LfM1TqQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A practical version of Wong's watermarking technique</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ouda, A.H. ; El-Sakka, M.R.</creator><creatorcontrib>Ouda, A.H. ; El-Sakka, M.R.</creatorcontrib><description>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 0780385543</identifier><identifier>ISBN: 9780780385542</identifier><identifier>EISSN: 2381-8549</identifier><identifier>DOI: 10.1109/ICIP.2004.1421639</identifier><language>eng</language><publisher>Piscataway NJ: IEEE</publisher><subject>Applied sciences ; Arithmetic ; Artificial intelligence ; Computer science ; Computer science; control theory; systems ; Computer security ; Data mining ; Equations ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Pattern recognition. Digital image processing. Computational geometry ; Public key ; Public key cryptography ; Resists ; Software ; Vector quantization ; Watermarking</subject><ispartof>2004 International Conference on Image Processing, 2004. ICIP '04, 2004, Vol.4, p.2615-2618 Vol. 4</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1421639$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54534,54899,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1421639$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17612003$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Ouda, A.H.</creatorcontrib><creatorcontrib>El-Sakka, M.R.</creatorcontrib><title>A practical version of Wong's watermarking technique</title><title>2004 International Conference on Image Processing, 2004. ICIP '04</title><addtitle>ICIP</addtitle><description>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</description><subject>Applied sciences</subject><subject>Arithmetic</subject><subject>Artificial intelligence</subject><subject>Computer science</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Data mining</subject><subject>Equations</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Resists</subject><subject>Software</subject><subject>Vector quantization</subject><subject>Watermarking</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>0780385543</isbn><isbn>9780780385542</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFkE1LxDAQhoMfYHf1B4iXXsRTayZJm-S4lFULC3pQPC5pOlmja1uTqvjvLVTwNId53pdnhpBzoDkA1dd1VT_kjFKRg2BQcn1AEsYVZKoQ-pAsqFSUq6IQ_IgkUDCWCaXoCVnE-Eopo8AhIWKVDsHY0VuzT78wRN93ae_S577bXcX024wY3k14890uHdG-dP7jE0_JsTP7iGd_c0mebtaP1V22ub-tq9Um84wWY4YGDHCupGuctiAFk20LiFphKZzUxpXN5CEdBW1bhsYyZFPCtU2jCm75klzOvYOJk58LprM-bofgJ6WfLcgSpvv5xF3MnEfE__X8Ff4LfM1TqQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Ouda, A.H.</creator><creator>El-Sakka, M.R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>A practical version of Wong's watermarking technique</title><author>Ouda, A.H. ; El-Sakka, M.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Arithmetic</topic><topic>Artificial intelligence</topic><topic>Computer science</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Data mining</topic><topic>Equations</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Resists</topic><topic>Software</topic><topic>Vector quantization</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Ouda, A.H.</creatorcontrib><creatorcontrib>El-Sakka, M.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ouda, A.H.</au><au>El-Sakka, M.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A practical version of Wong's watermarking technique</atitle><btitle>2004 International Conference on Image Processing, 2004. ICIP '04</btitle><stitle>ICIP</stitle><date>2004</date><risdate>2004</risdate><volume>4</volume><spage>2615</spage><epage>2618 Vol. 4</epage><pages>2615-2618 Vol. 4</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>0780385543</isbn><isbn>9780780385542</isbn><abstract>In this paper, we study the security of Wong's technique. It is shown that the technique is vulnerable to cryptographer's attacks. This is due to the use of short keys in the public-key cryptosystem. Short keys are used in Wong's technique to make the watermark small enough to fit in an image block. This paper proposes an elegant solution that helps Wong's technique to be practically implemented. A new method of applying the cryptographic hash function is utilized. This method makes the image blocks able to hold longer and secure watermarks while providing similar level of the localization accuracy. The experimental results show that the proposed solution carries Wong's technique from a cryptographically vulnerable system to a secure and practical one.</abstract><cop>Piscataway NJ</cop><pub>IEEE</pub><doi>10.1109/ICIP.2004.1421639</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1522-4880
ispartof 2004 International Conference on Image Processing, 2004. ICIP '04, 2004, Vol.4, p.2615-2618 Vol. 4
issn 1522-4880
2381-8549
language eng
recordid cdi_ieee_primary_1421639
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Applied sciences
Arithmetic
Artificial intelligence
Computer science
Computer science
control theory
systems
Computer security
Data mining
Equations
Exact sciences and technology
Memory and file management (including protection and security)
Memory organisation. Data processing
Pattern recognition. Digital image processing. Computational geometry
Public key
Public key cryptography
Resists
Software
Vector quantization
Watermarking
title A practical version of Wong's watermarking technique
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T16%3A51%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20practical%20version%20of%20Wong's%20watermarking%20technique&rft.btitle=2004%20International%20Conference%20on%20Image%20Processing,%202004.%20ICIP%20'04&rft.au=Ouda,%20A.H.&rft.date=2004&rft.volume=4&rft.spage=2615&rft.epage=2618%20Vol.%204&rft.pages=2615-2618%20Vol.%204&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=0780385543&rft.isbn_list=9780780385542&rft_id=info:doi/10.1109/ICIP.2004.1421639&rft_dat=%3Cpascalfrancis_6IE%3E17612003%3C/pascalfrancis_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i205t-ea1a13387fbf9c17427dd1ee98e64f79af6b0207f019cd2eac2e2a13fdbb853c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1421639&rfr_iscdi=true