Title :
Countermeasure of public key attacks for asymmetric watermarking
Author :
Kim, JongWeon ; Li, De
Author_Institution :
Dept. of Copyright Protection, Sangmyung Univ., Seoul, South Korea
Abstract :
In this paper, as a measure to respond to public key attacks that commonly occur in existing asymmetric watermarking systems, we propose a method to additionally generate and distribute public keys for the verification and detection of public key attacks. To configure an effective asymmetric watermarking system, public keys and private keys were generated based on a linear transformation method using special matrixes. The system was designed to be able to generate many public keys that can effectively detect correlations with the same private key when an attack has occurred, so that the system can effectively respond to public key attacks. Based on the results of the experiments, the system was able to effectively detect correlations using public and private keys in images where watermarks had been inserted. In addition, it was found that the system could effectively detect correlations in images under public key attacks by using additionally issued public keys for verification.
Keywords :
image watermarking; public key cryptography; asymmetric watermarking; image watermarking; linear transformation; public key attack detection; public key attack verification; Conferences; Correlation; Equations; Matrix decomposition; Public key; Transform coding; Watermarking; Asymmetric; Correlation Detection; Private key & Public key; Public key Attack;
Conference_Titel :
Advanced Communication Technology (ICACT), 2012 14th International Conference on
Conference_Location :
PyeongChang
Print_ISBN :
978-1-4673-0150-3