Skip to main content

Secure Quantization Index Modulation Watermark Detection

  • Conference paper
Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

  • 1076 Accesses

Abstract

In this paper we introduce the problem of watermark security for systems in which an implementation of a watermark detector is available to an attacker. This paper serves as an introduction to a keynote talk at IWDW 2006. This talk will review two homomorphic encryption methods, viz. Paillier and Goldwasser & Micali, and their application to secure detection of Quantization Index Modulation (QIM) watermarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  2. Cox, I., Linnartz, J.-P.: Public watermarks and resistance to tampering. In: Proceedings of the International Conference on Image Processing (ICIP 1997), pp. 26–29 (1997)

    Google Scholar 

  3. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Science 28, 270–299 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  4. Kalker, T.: Secure watermark detection. In: Proceedings of the 39th Allerton Conference On Communication, Control, And Computing (2005)

    Google Scholar 

  5. Malkin, M., Kalker, T.: A cryptographic method for secure watermark detection. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 26–41. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)

    Google Scholar 

  7. Trusted Computing Group. Trusted Platform Module, https://www.trustedcomputinggroup.org/groups/tpm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalker, T., Malkin, M. (2006). Secure Quantization Index Modulation Watermark Detection. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_2

Download citation

  • DOI: https://doi.org/10.1007/11922841_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics