In order to protect both the data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this is as follows: the transformation of a plaintext $x$ by the composition of the encryption and decryption operations using some encryption and decryption keys yields a proper text $x'$ containing a unique watermark $w$. The encryption and decryption keys in the w-cipher are connected in some way with each other and with the given watermark $w$. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how a data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.
@article{PDMA_2015_8_a19,
author = {G. P. Agibalov},
title = {Watermarking ciphers},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {54--59},
year = {2015},
number = {8},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/}
}
TY - JOUR
AU - G. P. Agibalov
TI - Watermarking ciphers
JO - Prikladnaya Diskretnaya Matematika. Supplement
PY - 2015
SP - 54
EP - 59
IS - 8
UR - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/
LA - ru
ID - PDMA_2015_8_a19
ER -
G. P. Agibalov. Watermarking ciphers. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 54-59. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/
[1] Stinson D. R., Cryptography. Theory and Practice, CRC Press, 1995, 434 pp. | MR | Zbl
[2] Menezes A., van Oorshot P., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1997, 662 pp. | MR | Zbl
[3] Langelaar G. C., Real-time Watermarking Techniques for Compressed Video Data, Delft University of Technology, Delft, 2000, 155 pp.
[4] Mistry D., “Comparison of digital water marking methods”, Intern. J. Comp. Sci. Engin., 2:9 (2010), 2905–2909
[5] Anzhin V. A., “Metod zaschity ot nelegalnogo kopirovaniya v tsifrovykh videotranslyatsiyakh cherez vnedrenie vodyanykh znakov pri rasshifrovanii”, Prikladnaya diskretnaya matematika. Prilozhenie, 2014, no. 7, 73–74