Watermarking ciphers
Prikladnaâ diskretnaâ matematika, no. 1 (2016), pp. 62-66
Cet article a éte moissonné depuis la source Math-Net.Ru
In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext $x$ by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text $x'$ containing a unique watermark $w$. The encryption and decryption keys in the w-cipher are connected with each other and with the given watermark $w$ in some way. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word, but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.
Keywords:
data protection, encryption, watermarks, watermarking ciphers, stream ciphers.
@article{PDM_2016_1_a5,
author = {G. P. Agibalov},
title = {Watermarking ciphers},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {62--66},
year = {2016},
number = {1},
language = {en},
url = {http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/}
}
G. P. Agibalov. Watermarking ciphers. Prikladnaâ diskretnaâ matematika, no. 1 (2016), pp. 62-66. http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/
[1] Stinson D. R., Cryptography. Theory and Practice, CRC Press, 1995, 434 pp. | MR | Zbl
[2] Menezes A., van Oorshot P., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1997, 662 pp. | MR | Zbl
[3] Langelaar G. C., Real-time Watermarking Techniques for Compressed Video Data, Delft University of Technology, Delft, 2000, 155 pp.
[4] Mistry D., “Comparison of digital water marking methods”, Intern. J. Comp. Sci. Engin., 2:9 (2010), 2905–2909
[5] Anjin V. A., “Content protection with bitstream watermarking at decryption stage”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2014, no. 7, 73–74 (in Russian)
[6] Method implementation for MPEG2 Video, , 2014 https://github.com/anjin-viktor/mpeg2decwtrk/