Secure Watermark Embedding Through Partial Encryption

  • Aweke Lemma
  • Stefan Katzenbeisser
  • Mehmet Celik
  • Michiel van der Veen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


Secure watermark embedding allows to securely embed a watermark into a piece of content at an untrusted user device without compromising the security of the watermark key, the watermark or the original. In this paper, we show how secure embedding can be achieved by using traditional watermarking schemes in conjunction with partial encryption techniques, which were primarily developed to facilitate fast encryption of media content. Based on this concept, we develop two new efficient secure embedding mechanisms, one for the MASK watermarking scheme operating on baseband audio and one for a spread spectrum watermarking scheme operating on MPEG-2 encoded video streams.


Watermark Scheme Watermark Embedding Audio Watermark Watermark Signal Watermark Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting—joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Open Mobile Allowance. OMA digital rights management,
  3. 3.
    Anderson, R., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Crowcroft, J., Perkins, C., Brown, I.: A method and apparatus for generating multiple watermarked copies of an information signal. WO Patent No. 00/56059 (2000)Google Scholar
  5. 5.
    Emmanuel, S., Kankanhalli, M.S.: Copyright protection for MPEG-2 compressed broadcast video. In: ICME 2001. IEEE Int. Conf. on Multimedia and Expo., pp. 206–209 (2001)Google Scholar
  6. 6.
    Kundur, D.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6), 918–932 (2004)CrossRefGoogle Scholar
  7. 7.
    Lemma, A.N., Aprea, J., Oomen, W., van de Kerkhof, L.: A temporal domain audio watermarking technique. IEEE Transactions on Signal Processing 51(4), 1088–1097 (2003)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Lemma, A.N., Aprea, J., Oomen, W., Kerkhof, L.v.d.: A robustness and audibility analysis of a temporal envelope modulating audio watermark. In: IEEE DSP/SPE workshop proceedings, Gallaway Gardans, GA, USA, October 13-16 (2002)Google Scholar
  9. 9.
    Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. In: Proceedings of the International Federation for Information Processing, Communications and Multimedia Security Joint working conference IFIP TC6 and TC11, pp. 149–158 (2001)Google Scholar
  10. 10.
    Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. In: Protocols for Multimedia Systems (PROMS 2000), pp. 249–256 (2000)Google Scholar
  11. 11.
    Tomsich, P., Katzenbeisser, S.: Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 38–47. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  12. 12.
    Uhl, A., Pommer, A.: Image and Video Encryption, From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  13. 13.
    van der Veen, M., Lemma, A., Kalker, A.A.C.: Electronic content delivery and forensic tracking. Multimedia Systems 11(2), 174–184 (2005)CrossRefGoogle Scholar
  14. 14.
    van der Veen, M., Lemma, A., Kalker, T.: Watermarking and fingerprinting for electronic music delivery. In: SPIE Workshop 2004, San Jose, CA, USA (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Aweke Lemma
    • 1
  • Stefan Katzenbeisser
    • 1
  • Mehmet Celik
    • 1
  • Michiel van der Veen
    • 1
  1. 1.Philips Research EuropeAE EindhovenThe Netherlands

Personalised recommendations