Watermarking ciphers
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 54-59.

Voir la notice de l'article provenant de la source Math-Net.Ru

In order to protect both the data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this is as follows: the transformation of a plaintext $x$ by the composition of the encryption and decryption operations using some encryption and decryption keys yields a proper text $x'$ containing a unique watermark $w$. The encryption and decryption keys in the w-cipher are connected in some way with each other and with the given watermark $w$. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how a data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.
Keywords: data protection, encryption, watermarks, watermarking ciphers, stream ciphers.
@article{PDMA_2015_8_a19,
     author = {G. P. Agibalov},
     title = {Watermarking ciphers},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {54--59},
     publisher = {mathdoc},
     number = {8},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/}
}
TY  - JOUR
AU  - G. P. Agibalov
TI  - Watermarking ciphers
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2015
SP  - 54
EP  - 59
IS  - 8
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/
LA  - ru
ID  - PDMA_2015_8_a19
ER  - 
%0 Journal Article
%A G. P. Agibalov
%T Watermarking ciphers
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2015
%P 54-59
%N 8
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/
%G ru
%F PDMA_2015_8_a19
G. P. Agibalov. Watermarking ciphers. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 54-59. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a19/

[1] Stinson D. R., Cryptography. Theory and Practice, CRC Press, 1995, 434 pp. | MR | Zbl

[2] Menezes A., van Oorshot P., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1997, 662 pp. | MR | Zbl

[3] Langelaar G. C., Real-time Watermarking Techniques for Compressed Video Data, Delft University of Technology, Delft, 2000, 155 pp.

[4] Mistry D., “Comparison of digital water marking methods”, Intern. J. Comp. Sci. Engin., 2:9 (2010), 2905–2909

[5] Anzhin V. A., “Metod zaschity ot nelegalnogo kopirovaniya v tsifrovykh videotranslyatsiyakh cherez vnedrenie vodyanykh znakov pri rasshifrovanii”, Prikladnaya diskretnaya matematika. Prilozhenie, 2014, no. 7, 73–74

[6] Method implementation for MPEG2 Video, , 2014 https://github.com/anjin-viktor/mpeg2decwtrk/