Skip to main content

Keyless Public Watermarking for Intellectual Property Authentication

  • Conference paper
  • First Online:
Book cover Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyless public watermarking method that enables the watermark to be publicly detectable. The basic idea is to create a cryptographically strong pseudo-random watermark, embed it into the original problem as a special (mutual exclusive) constraint, and make it public. No key is required to detect such watermark. We combine data integrity technique and the unique characteristics in the design of intellectual property such that adversaries can get almost no advantage for forgery from the public watermarking. This new technique is also compatible with the existing constraint-based watermarking techniques to enhance the strength of the watermark. We build the mathematical framework for the this approach based on the concept of mutual exclusive constraints. We use several well-known problems to explain our approach, demonstrate its robustness against attacks, and show that there is little degradation in performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Adelsbach, B. Pfitzmann, and A. Sadeghi. “Proving Ownership of Digital Content”. The 3rd International Information Hiding Workshop, pp. 126–141, September 1999.

    Google Scholar 

  2. S. Craver. “Zero Knowledge Watermark Detection”. The 3rd International Information Hiding Workshop, pp. 102–115, September 1999.

    Google Scholar 

  3. F. Hartung and B. Girod. “Fast Public-Key Watermarking of Compressed Video”. IEEE International Conference on Image Processing, pp. 528–531, October 1997.

    Google Scholar 

  4. A. B. Kahng, et al. “Watermarking Techniques for Intellectual Property Protection”. 35th Design Automation Conference Proceedings, pp. 776–781, 1998.

    Google Scholar 

  5. J. Lach, W. H. Mangione-Smith, and M. Potkonjak. “Fingerprinting Digital Circuits on Programmable Hardware”. The 2nd International Information Hiding Workshop, pp. 16–31, April 1998.

    Google Scholar 

  6. B. Pfitzmann. “Information Hiding Terminology”, The 1st International Information Hiding Workshop, pp. 347–350, May 1996.

    Google Scholar 

  7. G. Qu and M. Potkonjak. “Hiding Signatures in Graph Coloring Solutions”. The 3rd International Information Hiding Workshop, pp. 391–408, September 1999.

    Google Scholar 

  8. Virtual Socket Interface Alliance. “Intellectual Property Protection White Paper: Schemes, Alternatives and Discussion Version 1.0–, September 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qu, G. (2001). Keyless Public Watermarking for Intellectual Property Authentication. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics