Correlation-based asymmetric watermark detector

Tae Young Kim, Taejeong Kim, Hyuk Choi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations


Asymmetric watermarking is second generation watermarking scheme which uses different keys for watermark embedders and detectors for public applications. Recently, many algorithms to render asymmetry were suggested: for example, eigenvector watermark, periodic watermark, neural network system, etc. A simple algorithm was proposed by Hartung and Girod (1997). They generated a detection key by substituting noise for a portion of a given embedding key and detected the watermarks by the usual correlation test. In this paper, we generalize their idea by the concept of the angle of the two keys. We study correlation detector structure for a transform based asymmetric watermarking scheme. We propose a secure transform to render asymmetry: random directional angle rotation after linear projection. We also address the merits and the drawbacks of the proposed system.

Original languageEnglish
Title of host publicationProceedings - ITCC 2003, International Conference on Information Technology
Subtitle of host publicationComputers and Communications
EditorsPradip K. Srimani, Emma Regentova, Ray Hashemi, Elaine Lawrence, Mario Cannataro, Amanda Spink, Wolf Bein
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages5
ISBN (Electronic)0769519164, 9780769519166
StatePublished - 2003
EventInternational Conference on Information Technology: Computers and Communications, ITCC 2003 - Las Vegas, United States
Duration: 28 Apr 200330 Apr 2003

Publication series

NameProceedings ITCC 2003, International Conference on Information Technology: Computers and Communications


ConferenceInternational Conference on Information Technology: Computers and Communications, ITCC 2003
Country/TerritoryUnited States
CityLas Vegas


Dive into the research topics of 'Correlation-based asymmetric watermark detector'. Together they form a unique fingerprint.

Cite this