Abstract
In this paper we introduce the problem of watermark security for systems in which an implementation of a watermark detector is available to an attacker. This paper serves as an introduction to a keynote talk at IWDW 2006. This talk will review two homomorphic encryption methods, viz. Paillier and Goldwasser & Micali, and their application to secure detection of Quantization Index Modulation (QIM) watermarks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Cox, I., Linnartz, J.-P.: Public watermarks and resistance to tampering. In: Proceedings of the International Conference on Image Processing (ICIP 1997), pp. 26–29 (1997)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Science 28, 270–299 (1984)
Kalker, T.: Secure watermark detection. In: Proceedings of the 39th Allerton Conference On Communication, Control, And Computing (2005)
Malkin, M., Kalker, T.: A cryptographic method for secure watermark detection. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 26–41. Springer, Heidelberg (2007)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
Trusted Computing Group. Trusted Platform Module, https://www.trustedcomputinggroup.org/groups/tpm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kalker, T., Malkin, M. (2006). Secure Quantization Index Modulation Watermark Detection. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_2
Download citation
DOI: https://doi.org/10.1007/11922841_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)