Watermarking ciphers | Applied Discrete Mathematics. Supplement. 2015. № 8.

Watermarking ciphers

In order to protect both the data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this is as follows: the transformation of a plaintext x by the composition of the encryption and decryption operations using some encryption and decryption keys yields a proper text x' containing a unique watermark w. The encryption and decryption keys in the w-cipher are connected in some way with each other and with the given watermark w. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how a data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.

Download file
Counter downloads: 238

Keywords

stream ciphers, watermarking ciphers, watermarks, encryption, data protection, поточные шифры, шифры с водяными знаками, водяные знаки, шифрование, защита данных

Authors

NameOrganizationE-mail
Agibalov G. P.Tomsk State Universityagibalov@isc.tsu.ru
Всего: 1

References

https://github.com/anjin-viktor/mpeg2decwtrk/ - Method implementation for MPEG2 Video. 2014.
Анжин В. А. Метод защиты от нелегального копирования в цифровых видеотрансляциях через внедрение водяных знаков при расшифровании // Прикладная дискретная математика. Приложение. 2014. №. 7. С. 73-74.
Langelaar G. C. Real-time Watermarking Techniques for Compressed Video Data. Delft: Delft University of Technology, 2000. 155 p.
Mistry D. Comparison of digital water marking methods // Intern. J. Comp. Sci. Engin. 2010. V.2. No. 9. P. 2905-2909.
Stinson D. R. Cryptography. Theory and Practice. CRC Press, 1995. 434 p.
Menezes A., van Oorshot P., and Vanstone S. Handbook of Applied Cryptography. CRC Press, 1997. 662 p.
 Watermarking ciphers | Applied Discrete Mathematics. Supplement. 2015. № 8.

Watermarking ciphers | Applied Discrete Mathematics. Supplement. 2015. № 8.

Download full-text version
Counter downloads: 1755