메뉴 건너뛰기




Volumn 30, Issue 2, 2013, Pages 87-96

Secure watermarking for multimedia content protection: A review of its benefits and open issues

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL WATERMARKING; VIDEO ON DEMAND;

EID: 85032751187     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2012.2228342     Document Type: Review
Times cited : (120)

References (37)
  • 1
    • 33646128241 scopus 로고    scopus 로고
    • Non-interactive watermark detection for a correlation-based watermarking scheme
    • Communications and Multimedia Security Berlin/Heidelberg: Springer
    • A. Adelsbach, M. Rohe, and A.-R. Sadeghi, "Non-interactive watermark detection for a correlation-based watermarking scheme," in Communications and Multimedia Security (Lecture Notes in Computer Science, vol. 3677). Berlin/Heidelberg: Springer, 2005, pp. 129-139.
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 129-139
    • Adelsbach, A.1    Rohe, M.2    Sadeghi, A.-R.3
  • 3
    • 84947921901 scopus 로고    scopus 로고
    • Chameleon - A New Kind of Stream Cipher
    • Fast Software Encryption
    • R. J. Anderson and C. Manifavas, "Chameleon: a new kind of stream cipher," in Proc. 4th Int. Workshop Fast Software Encryption (FSE'97), London, 1997, pp. 107-113. (Pubitemid 127100708)
    • (1997) Lecture Notes In Computer Science , Issue.1267 , pp. 107-113
    • Anderson, R.1    Manifavas, C.2
  • 5
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • Mar.
    • T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 180-187, Mar. 2010.
    • (2010) IEEE Trans. Inform. Forensics Sec , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 6
    • 78651086488 scopus 로고    scopus 로고
    • A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    • M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. D. Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process. Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
    • (2011) Signal Process. Image Commun , vol.26 , Issue.1 , pp. 1-12
    • Cancellaro, M.1    Battisti, F.2    Carli, M.3    Boato, G.4    Natale, F.D.5    Neri, A.6
  • 7
    • 49549083913 scopus 로고    scopus 로고
    • Look-up table based secure client-side embedding for spread-spectrum watermarks
    • M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, "Look-up table based secure client-side embedding for spread-spectrum watermarks," IEEE Trans. Inform. Forensics Sec., vol. 3, no. 3, pp. 475-487, 2008.
    • (2008) IEEE Trans. Inform. Forensics Sec , vol.3 , Issue.3 , pp. 475-487
    • Celik, M.1    Lemma, A.2    Katzenbeisser, S.3    Veen Der M.Van4
  • 9
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 11
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • July
    • I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 12
    • 84958774556 scopus 로고    scopus 로고
    • A statistically-hiding integer commitment scheme based on groups with hidden order
    • I. Damgård and E. Fujisaki, "A statistically-hiding integer commitment scheme based on groups with hidden order," in Proc. Advances in Cryptology-ASIACRYPT' 02, LNCS 2501, 2002, pp. 125-142.
    • (2002) Proc. Advances in Cryptology-ASIACRYPT' 02, LNCS , vol.2501 , pp. 125-142
    • Damgård, I.1    Fujisaki, E.2
  • 13
    • 70449671086 scopus 로고    scopus 로고
    • An efficient buyer-seller watermarking protocol based on composite signal representation
    • Princeton, NJ
    • M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," in Proc. 11th ACM Workshop Multimedia and Security, Princeton, NJ, 2009, pp. 9-18.
    • (2009) Proc. 11th ACM Workshop Multimedia and Security , pp. 9-18
    • Deng, M.1    Bianchi, T.2    Piva, A.3    Preneel, B.4
  • 16
    • 83755220834 scopus 로고    scopus 로고
    • Secure client-side digital watermarking using optimal key selection
    • Communication and Networking T.-H. Kim, H. Adeli, W.-C. Fang, T. Vasilakos, A. Stoica, C. Z. Patrikakis, G. Zhao, J. G. Villalba, and Y. Xiao, Eds. Berlin/Heidelberg, Germany: Springer
    • J.-J. Jiang and C.-M. Pun, "Secure client-side digital watermarking using optimal key selection," in Communication and Networking (Communications in Computer and Information Science, vol. 266), T.-H. Kim, H. Adeli, W.-C. Fang, T. Vasilakos, A. Stoica, C. Z. Patrikakis, G. Zhao, J. G. Villalba, and Y. Xiao, Eds. Berlin/Heidelberg, Germany: Springer, 2011, pp. 162-168.
    • (2011) Communications in Computer and Information Science , vol.266 , pp. 162-168
    • Jiang, J.-J.1    Pun, C.-M.2
  • 18
    • 49949091356 scopus 로고    scopus 로고
    • Combining Tardos fingerprinting codes and fingercasting
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin/Heidelberg, Germany: Springer
    • S. Katzenbeisser, B. Škori, M. Celik, and A.-R. Sadeghi, "Combining Tardos fingerprinting codes and fingercasting," in Information Hiding (Lecture Notes in Computer Science, vol. 4567), T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin/Heidelberg, Germany: Springer, 2007, pp. 294-310.
    • (2007) Information Hiding (Lecture Notes in Computer Science , vol.4567 , pp. 294-310
    • Katzenbeisser, S.1    Škori, B.2    Celik, M.3    Sadeghi, A.-R.4
  • 19
    • 77952507577 scopus 로고    scopus 로고
    • On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
    • Jan. 2010
    • M. Kuribayashi, "On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol, EURASIP J. Inform. Sec., vol. 2010, pp. 1:1-1:11, Jan. 2010.
    • (2010) EURASIP J. Inform. Sec , pp. 11-111
    • Kuribayashi, M.1
  • 20
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • DOI 10.1109/TIP.2005.859383
    • M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129-2139, Dec. 2005. (Pubitemid 41763728)
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 21
    • 85032751121 scopus 로고    scopus 로고
    • Encrypted signal processing for privacy protection
    • R. L. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 82-105, 2013.
    • (2013) IEEE Signal Process. Mag , vol.30 , Issue.1 , pp. 82-105
    • Lagendijk, R.L.1    Erkin, Z.2    Barni, M.3
  • 23
    • 84859552729 scopus 로고    scopus 로고
    • Joint fingerprinting and decryption with noise-resistant for vector quantization images
    • C.-Y. Lin, P. Prangjarote, L.-W. Kang, W.-L. Huang, and T.-H. Chen, "Joint fingerprinting and decryption with noise-resistant for vector quantization images," Signal Process., vol. 92, no. 9, pp. 2159-2171, 2012.
    • (2012) Signal Process , vol.92 , Issue.9 , pp. 2159-2171
    • Lin, C.-Y.1    Prangjarote, P.2    Kang, L.-W.3    Huang, W.-L.4    Chen, T.-H.5
  • 24
    • 79952971621 scopus 로고    scopus 로고
    • Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks
    • Apr.
    • W. Lin, H. Zhao, and K. Liu, "Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks," IEEE Trans. Multimedia, vol. 13, no. 2, pp. 191-205, Apr. 2011.
    • (2011) IEEE Trans. Multimedia , vol.13 , Issue.2 , pp. 191-205
    • Lin, W.1    Zhao, H.2    Liu, K.3
  • 25
  • 26
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • DOI 10.1109/83.913598, PII S1057714901027300
    • N. Memon and P. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001. (Pubitemid 32371598)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 27
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology-EUROCRYPT 1999 New York: Springer
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT 1999 (Lecture Notes in Computer Science, no. 1592). New York: Springer, 1999, pp. 223-238.
    • (1999) Lecture Notes in Computer Science , Issue.1592 , pp. 223-238
    • Paillier, P.1
  • 28
    • 21844445258 scopus 로고    scopus 로고
    • Rational Dither Modulation: A high-rate data-hiding method invariant to gain attacks
    • DOI 10.1109/TSP.2005.855407
    • F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo, "Rational dither modulation: A high-rate data-hiding method invariant to gain attacks," IEEE Trans. Signal Process. vol. 53, no. 10, pp. 3960-3975, Oct. 2005. (Pubitemid 41638247)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.II10 , pp. 3960-3975
    • Perez-Gonzalez, F.1    Mosquera, C.2    Barni, M.3    Abrardo, A.4
  • 29
    • 84947921515 scopus 로고    scopus 로고
    • Asymmetric fingerprinting
    • B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," in Advances in Cryptology-EUROCRYPT'96 (Lecture Notes in Computer Science, no. 1070). Berlin/Heidelberg: Springer, 1996, pp. 84-95. (Pubitemid 126071056)
    • (1996) Lecture Notes In Computer Science , Issue.1070 , pp. 84-95
    • Pfitzmann, B.1    Schunter, M.2
  • 30
    • 77249113281 scopus 로고    scopus 로고
    • Secure client-side ST-DM watermark embedding
    • Mar.
    • A. Piva, T. Bianchi, and A. De Rosa, "Secure client-side ST-DM watermark embedding," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 13-26, Mar. 2010.
    • (2010) IEEE Trans. Inform. Forensics Sec , vol.5 , Issue.1 , pp. 13-26
    • Piva, A.1    Bianchi, T.2    De Rosa, A.3
  • 32
    • 78650329772 scopus 로고    scopus 로고
    • An efficient buyer-seller watermarking protocol based on chameleon encryption
    • Digital Watermarking H.-J. Kim, S. Katzenbeisser, and A. Ho, Eds Berlin/Heidelberg, Germany: Springer
    • G. Poh and K. Martin, "An efficient buyer-seller watermarking protocol based on chameleon encryption," in Digital Watermarking (Lecture Notes in Computer Science, vol. 5450), H.-J. Kim, S. Katzenbeisser, and A. Ho, Eds., pp. 433-447. Berlin/Heidelberg, Germany: Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5450 , pp. 433-447
    • Poh, G.1    Martin, K.2
  • 33
    • 37649018591 scopus 로고    scopus 로고
    • Anonymous fingerprinting with robust QIM watermarking techniques
    • J. P. Prins, Z. Erkin, and R. L. Lagendijk, "Anonymous fingerprinting with robust QIM watermarking techniques," EURASIP J. Inform. Sec., vol. 2007, pp. 13, 2007.
    • (2007) EURASIP J. Inform. Sec , vol.2007 , pp. 13
    • Prins, J.P.1    Erkin, Z.2    Lagendijk, R.L.3
  • 34
    • 78649400346 scopus 로고    scopus 로고
    • A provably secure anonymous buyer-seller watermarking protocol
    • Dec.
    • A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 4, pp. 920-931, Dec. 2010.
    • (2010) IEEE Trans. Inform. Forensics Sec , vol.5 , Issue.4 , pp. 920-931
    • Rial, A.1    Deng, M.2    Bianchi, T.3    Piva, A.4    Preneel, B.5
  • 35
    • 84858062033 scopus 로고    scopus 로고
    • A survey of H.264 AVC/SVC encryption
    • Mar.
    • T. Stutz and A. Uhl, "A survey of H.264 AVC/SVC encryption," IEEE Trans. Circuits Syst Video Technol, vol. 22, no. 3, pp. 325-339, Mar. 2012.
    • (2012) IEEE Trans. Circuits Syst Video Technol , vol.22 , Issue.3 , pp. 325-339
    • Stutz, T.1    Uhl, A.2
  • 37
    • 84873926385 scopus 로고    scopus 로고
    • Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
    • P. Zheng and J. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking," in Proc. 14th Information Hiding Conf., 2012.
    • (2012) Proc. 14th Information Hiding Conf
    • Zheng, P.1    Huang, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.