The Control Technology of Integrity and Legitimacy of LUT-Oriented Information Object Usage by Self-Recovering Digital Watermark

The paper proposes the technology of control of integrity and legitimacy of information object usage with the Look Up Table-oriented (LUToriented) architecture. The technology is based on embedding the self-recovery digital watermark into information objects of such kind. The technology is the composition of approaches to forming the self-recovery digital watermarks in the passive multimedia containers, and approaches to embedding the extra information into LUT-containers. The process of embedding the extra information occurs with the help of classification of container elements and their purposeful modification within the set of the formed classes. The procedure of immediate embedding the data at the level of LUT-container elementary parts includes the value inversion of current processed LUT unit and propagation of the inversion around all the inputs of LUT units connected to the current unit output. The description of practical realization of the proposed technology is represented.

[1]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[2]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..

[3]  Raphael C.-W. Phan Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson , 2009, Cryptologia.

[4]  Nasir D. Memon,et al.  Watermarking and ownership problem: a revisit , 2005, DRM '05.

[5]  Swarup Bhunia,et al.  Reconfigurable computing using content addressable memory for improved performance and resource usage , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[6]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[7]  K. Zashcholkin STEGANOGRAPHY DATA HIDING IN LUT-ORIENTED HARDWARE CONTAINERS METHOD DEVELOPMENT , 2014 .

[8]  P. P. Deepthi,et al.  An Integrity Verification System for Images Using Hashing and Watermarking , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[9]  Huazhong Shu,et al.  A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization , 2013, IEEE Journal of Biomedical and Health Informatics.

[10]  Ryan Kastner,et al.  Handbook of FPGA Design Security , 2010 .

[11]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[12]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[13]  Frank Y. Shih Multimedia security : watermarking, steganography, and forensics , 2012 .