In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext $x$ by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text $x'$ containing a unique watermark $w$. The encryption and decryption keys in the w-cipher are connected with each other and with the given watermark $w$ in some way. In contrast with the ciphers usually studied in cryptography, the encryption function in a w-cipher is not compulsorily invertible. Thus in fact w-ciphers are not ciphers in the known sense of the word, but the ciphers are w-ciphers of a certain partial type, and all terms, notions and notations related to ciphers are quite applicable to w-ciphers. It is shown how data watermarking can be performed by applying a w-cipher in such a way that the concealment of a watermark into a plaintext is accomplished by this w-cipher either in the encryption or in the decryption processes. Some examples of w-ciphers constructed on the basis of symmetric stream ciphers are presented in the paper.
@article{PDM_2016_1_a5,
author = {G. P. Agibalov},
title = {Watermarking ciphers},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {62--66},
year = {2016},
number = {1},
language = {en},
url = {http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/}
}
TY - JOUR
AU - G. P. Agibalov
TI - Watermarking ciphers
JO - Prikladnaâ diskretnaâ matematika
PY - 2016
SP - 62
EP - 66
IS - 1
UR - http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/
LA - en
ID - PDM_2016_1_a5
ER -
%0 Journal Article
%A G. P. Agibalov
%T Watermarking ciphers
%J Prikladnaâ diskretnaâ matematika
%D 2016
%P 62-66
%N 1
%U http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/
%G en
%F PDM_2016_1_a5
G. P. Agibalov. Watermarking ciphers. Prikladnaâ diskretnaâ matematika, no. 1 (2016), pp. 62-66. http://geodesic.mathdoc.fr/item/PDM_2016_1_a5/
[1] Stinson D. R., Cryptography. Theory and Practice, CRC Press, 1995, 434 pp. | MR | Zbl
[2] Menezes A., van Oorshot P., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1997, 662 pp. | MR | Zbl
[3] Langelaar G. C., Real-time Watermarking Techniques for Compressed Video Data, Delft University of Technology, Delft, 2000, 155 pp.
[4] Mistry D., “Comparison of digital water marking methods”, Intern. J. Comp. Sci. Engin., 2:9 (2010), 2905–2909
[5] Anjin V. A., “Content protection with bitstream watermarking at decryption stage”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2014, no. 7, 73–74 (in Russian)