Abstract
A problem of considerable theoretical interest in digital watermarking is that of asymmetric, or zero-knowledge watermarking. In this problem, we wish to embed a watermark in a piece of multimedia and later prove that we have done so, but without revealing information that can be used by an adversary to remove the signal later.
In this paper we develop a watermarking system based on the ambiguity attack method outlined in [14], constructing a vector-based watermarking system applicable to images, audio and video. An example of image watermarking is provided. We also outline some important attacks and thus important design principles for asymmetric watermarking systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute (1995)
Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships With Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection (April 1998) (IBM Research Report, RC 20755, March 1997)
Hachez, G., Quisquater, J.-J.: Which directions for asymmetric watermarking? In: Proceedings of EUSIPCO (Toulouse, France (September 2002)
Craver, S., Katzenbeisser, S.: Security Analysis of Public-Key Watermarking Schemes. In: Proceedings of SPIE, Mathematics of Data/Image Coding, Compression and Encryption IV, July 2001, vol. 4475, pp. 172–182 (2001)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
Hartung, F.H., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE, San Jose, CA, February 1999, pp. 147–158 (1999)
Hartung, F.H., Girod, B.: Fast Public-Key Watermarking of Compressed Video. In: Proceedings of IEEE International Conference on Speech and Signal Processing (1997)
Salomaa, A.: Public-Key Cryptography, 2nd edn. Springer, Berlin (1996)
Viega, J., Girouard, Z., Messier, M.: Secure Programming Cookbook. O’Reilly, Sebastopol (2003)
Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Schneier, B.: Applied Cryptograpy: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)
Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proceedings of IS&T PIC Conference (Portland, OR) (May 1998)
Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proceedings of ICIP, Santa Barbara, CA, October 1997, IEEE press, Los Alamitos (1997)
Craver, S.: Zero Knowledge Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)
Adelsbach, A., Sadeghi, A.-R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Craver, S., Liu, B., Wolf, W. (2004). An Implementation of, and Attacks on, Zero-Knowledge Watermarking. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)