Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables

@article{Celik2007SecureEO,
  title={Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables},
  author={Mehmet Utku Celik and Aweke N. Lemma and Stefan Katzenbeisser and Michiel van der Veen},
  journal={2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07},
  year={2007},
  volume={2},
  pages={II-153-II-156}
}
In an electronic content distribution system, it is preferable to embed forensic tracking watermarks at the client-side to limit bandwidth usage and server complexity. Embedding in these untrusted clients, however, requires secure embedding methods that do not leak unmarked contents or the watermarking secrets. In this work, we propose a look-up-table (LUT) based cipher, similar to Andersen's Chameleon cipher, for securely embedding spread-spectrum watermarks, which are noise robust and… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 18 extracted citations

Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images

2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society • 2014
View 13 Excerpts
Highly Influenced

Watermarking system for encrypted images at cloud to check reliability of images

2015 1st International Conference on Next Generation Computing Technologies (NGCT) • 2015
View 1 Excerpt

TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding

IEEE Transactions on Information Forensics and Security • 2014
View 1 Excerpt

TTP-free asymmetric fingerprinting protocol based on client side embedding

2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) • 2014
View 1 Excerpt

Digital watermarking with network bandwidth efficiency for multimedia security

2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN) • 2012

References

Publications referenced by this paper.
Showing 1-7 of 7 references

U

A. Adelsbach
Huber, and A.-R. Sadeghi, “Fingercasting— joint fingerprinting and decryption of broadcast messages,” in 11th Australasian Conf. on Info. Security and Privacy • 2006
View 7 Excerpts
Highly Influenced

Attacks and Forensic Analysis for Multimedia Content Protection

2005 IEEE International Conference on Multimedia and Expo • 2005
View 1 Excerpt

Copyright protection for MPEG-2 compressed broadcast video

IEEE International Conference on Multimedia and Expo, 2001. ICME 2001. • 2001
View 1 Excerpt

Collusion-Secure Fingerprinting for Digital Data

IEEE Trans. Information Theory • 1998
View 1 Excerpt

Similar Papers

Loading similar papers…