In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext x by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text x containing a unique watermark w. The encryption and decryption keys in the w-cipher are connected with each other and with the given watermark w in some way. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word, but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.
Download file
Counter downloads: 326
- Title Watermarking ciphers
- Headline Watermarking ciphers
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 1(31)
- Date:
- DOI
Keywords
watermarking ciphers, watermarks, encryption, data protection, stream ciphers, защита данных, шифрование, водяные знаки, шифры с водяными знаками, поточные шифрыAuthors
References
https://github.com/anjin-viktor/mpeg2decwtrk/ - Method implementation for MPEG2 Video. 2014.
Anjin V.A. Metod zashchity ot nelegal'nogo kopirovaniya v tsifrovykh videotranslyatsiyakh cherez vnedrenie vodyanykh znakov pri rasshifrovanii [Content protection with bitstream watermarking at decryption stage]. Prikladnaya Diskretnaya Matematika. Prilozhenie, 2014, no. 7, pp. 73-74. (in Russian)
Langelaar G. C. Real-time Watermarking Techniques for Compressed Video Data. Delft: Delft University of Technology, 2000. 155 p.
Mistry D. Comparison of digital water marking methods. Intern. J. Comp. Sci. Engin., 2010, vol. 2, no. 9, pp. 2905-2909.
Stinson D. R. Cryptography. Theory and Practice. CRC Press, 1995. 434 p.
Menezes A., van Oorshot P., and Vanstone S. Handbook of Applied Cryptography. CRC Press, 1997. 662 p.
Watermarking ciphers | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2016. № 1(31).