Академический Документы
Профессиональный Документы
Культура Документы
10
PUBLLIC-KEY STEGANOGRAPHY
Similarly as in case of the public-key cryptography, two
keys are used: a public-key E for embedding and a
private-key D for recovering.
11
12
13
14
15
16
SECURITY of STEGOSYSTEMS
Definition A steganographic algorithm is called secure if
17
18
19
Substitution into parity bits of blocks. If parity bit of the block cki is mi,
then the block cki is not changed; otherwise one of its bits is changed.
20
21
IV054
Inputs to the scheme are the watermark, the cover data and an optional public or
secret key. The output are watermarked data. The key is used to enforce security.
Figure 3 shows the basic scheme for watermark recovery schemes.
Inputs to the scheme are the watermarked data, the secret or public key and,
depending on the method, the original data and/or the original watermark.
The output is the recovered watermarked W or some kind of confidence measure
indicating how likely it is for the given watermark at the input to be present in the
data under inspection.
Steganography and Watermarking
22
23
24
25
26