Skip to main content

Automatic Detection of a Watermarked Document Using a Private Key

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

Many algorithms which mark data in order to enforce copyright protection have recently been proposed. Among these, the family of spread-spectrum based schemes is predominant. This family has an inherent weakness when used to mark several documents: either it changes the key for each document and has to maintain a complex database of keys or it uses the same key for every document and will face collusion attacks. In this paper, we propose a new blind scheme, which embeds different marks in different documents, but allows detection with the help of a single private key. Our scheme can be used on top of most existing spread spectrum based schemes, and is much less prone to collusion attacks than the latters. We also prove that the false positive and false negative detection rates of our protocol are exponentially small. Finally, we believe the mathematical tools used in this article to prove concentration of random variables around their means will be useful for analyzing other watermarking schemes, and that they will be of further use for other problems in cryptology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Boeuf and J. P. Stern. An analysis of one of the SDMI candidates. These proceedings.

    Google Scholar 

  2. I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conference on Image Processing, volume 3, pages 243–246, 1996.

    Google Scholar 

  3. I. J. Cox, J.Kilian, T.Leighton, and T.Shamoon. A secure, robust watermark for multimedia. In Ross Anderson, editor, Workshop on Information Hiding, number 1174 in Lecture Notes in Computer Science. Springer-Verlag, 1996.

    Google Scholar 

  4. Ingemar J. Cox and Matt L. Miller. A review of watermarking anf the importance of perceptual modeling. In Proc. of Electronic Imagining’ 97, 1997.

    Google Scholar 

  5. J. Eggers, J. Su, and B. Girod. Asymmetric watermarking schemes. In Sicherheit en Mediendeten, 2000.

    Google Scholar 

  6. J. Eggers, J. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In EUSIPCO, 2000.

    Google Scholar 

  7. T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. In IH99, pages 88–100, 1999.

    Google Scholar 

  8. T. Furon and P. Duhamel. Robustness of an asymmetric technique. In ICIP 2000, 2000.

    Google Scholar 

  9. T. Furon, I. Venturini, and P. Duhamel. A unified approach of asymmetric schemes. In E. Delp and P. Wah Wong, editors, Security and Watermarking of Multimedia Contents, number 4312 in Proceedings of SPIE. SPIE, 2001.

    Google Scholar 

  10. F. Hartung and B. Girod. Digital watermarking of raw and compressed video. In SPIE 2952: Digital Compression Technologies and Systems for Video Communication, pages 205–213, 1996.

    Google Scholar 

  11. N. F. Johnson, Z. Duric, and S. Jajodia. Recovery of watermarks from distorted images. In Andreas Pfitzmann, editor, Information Hiding Workshop’ 99, Lecture Notes in Computer Science, pages 318–332. Springer-Verlag, 1999.

    Google Scholar 

  12. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science, pages 218–238. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  13. S. Perreira and T. Pun. Fast robust template matching for affine resistant image watermarks. In Andreas Pfitzmann, editor, Information Hiding Workshop’ 99, Lecture Notes in Computer Science, pages 199–210. Springer-Verlag, 1999.

    Google Scholar 

  14. B. Pfitzmann and M. Schunter. Asymmetric fingerprinting (extended abstract). In Ueli Maurer, editor, Advances in Cryptology-Eurocrypt 96, number 1070 in Lecture Notes in Computer Science, pages 84–95. Springer-Verlag, 1996.

    Google Scholar 

  15. R. L. Pickholtz, D. L. Schilling, and L. B. Millstein. Theory of spread spectrum communications — a tutorial. In IEEE Trans. on Communications, pages 855–884, 1982.

    Google Scholar 

  16. B. Pfitzmann and M. Waidner. Asymmetric fingerprinting for larger collusions. In 4th ACM Conference on Computer and Communications Security, pages 151–160, 1997.

    Google Scholar 

  17. J. Smith and C. Dodge. Develoments in steganography. In Andreas Pfitzmann, editor, Third Workshop on Information Hiding, number 1768 in Lecture Notes in Computer Science, pages 77–87. Springer-Verlag, 1999.

    Google Scholar 

  18. J. P. Stern and J-P. Tillich. Automatic detection of a watermarked document using a single private key. full version. http://www.julienstern.org/files/detection/

  19. R. Van Schyndel, A. Tirkel, and I. Svalbe. Key independent watermark detection. Int. Conf. on Multimedia Computing and Systmes. volume 1, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stern, J.P., Tillich, JP. (2001). Automatic Detection of a Watermarked Document Using a Private Key. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics