﻿<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">1822-8844</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<issn-l>0868-4952</issn-l>
			<publisher>
				<publisher-name>Vilnius University Institute of Mathematics and Informatics</publisher-name>
				<publisher-loc>Akademijos 4, LT-08663 Vilnius, Lithuania</publisher-loc>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">INFO587</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2005.085</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research Article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Kazakevičiūtė</surname>
						<given-names>Geruta</given-names>
					</name>
					<email xlink:href="mailto:geruta@delfi.lt">geruta@delfi.lt</email>
					<xref ref-type="aff" rid="j_info587_aff_001">a</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Januškevičius</surname>
						<given-names>Eugenijus</given-names>
					</name>
					<email xlink:href="mailto:ejs@ar.vtu.lt">ejs@ar.vtu.lt</email>
					<xref ref-type="aff" rid="j_info587_aff_002">b</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Rosenbaum</surname>
						<given-names>René</given-names>
					</name>
					<email xlink:href="mailto:rrosen@informatik.uni-rostock.de">rrosen@informatik.uni-rostock.de</email>
					<xref ref-type="aff" rid="j_info587_aff_003">c</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Schumann</surname>
						<given-names>Heidrun</given-names>
					</name>
					<email xlink:href="mailto:schumann@informatik.uni-rostock.de">schumann@informatik.uni-rostock.de</email>
					<xref ref-type="aff" rid="j_info587_aff_003">c</xref>
				</contrib>
				<aff id="j_info587_aff_001">
					<label>a</label>Dept. of Graphical Systems, <institution>Vilnius Gediminas Technical University</institution>, Saulėtekio 11, LT-10223 Vilnius, <country>Lithuania</country>
				</aff>
				<aff id="j_info587_aff_002">
					<label>b</label>CAAD Laboratory, Dept. of Architecture, <institution>Vilnius Gediminas Technical University</institution>, Trakų 1/26, LT-01132 Vilnius, <country>Lithuania</country>
				</aff>
				<aff id="j_info587_aff_003">
					<label>c</label>Institute of Computer Graphics, Dept. of CS, <institution>University of Rostock</institution>, Albert Einstein 21, D-18059 Rostock, <country>Germany</country>
				</aff>
			</contrib-group>
			<pub-date pub-type="ppub">
				<year>2005</year>
			</pub-date>
			<volume>16</volume>
			<issue>1</issue>
			<fpage>75</fpage>
			<lpage>92</lpage>
			<history>
				<date date-type="received">
					<day>1</day>
					<month>8</month>
					<year>2003</year>
				</date>
			</history>
			<permissions>
				<copyright-statement>© 2005 Institute of Mathematics and Informatics, Vilnius</copyright-statement>
				<copyright-year>2005</copyright-year>
				<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
					<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p>
				</license>
			</permissions>
			<abstract>
				<p>The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used in existing image coding standards. In presented watermarking method the application of public key infrastructure is emphasized. We use PGP (Pretty Good Privacy) public key management scheme as the element for verification of sender’s identity and also place of storing and retrieval of watermark detection keys. The most public key watermarking schemes use new, independent and cryptologically unverified keys. The reuse existing key verification and exchange infrastructure provides us cryptologically strong and verified keys.</p>
			</abstract>
			<kwd-group>
				<label>Key words</label>
				<kwd>public watermarking</kwd>
				<kwd>public key</kwd>
				<kwd>image hash</kwd>
				<kwd>wavelets</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>