Abstract
A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyless public watermarking method that enables the watermark to be publicly detectable. The basic idea is to create a cryptographically strong pseudo-random watermark, embed it into the original problem as a special (mutual exclusive) constraint, and make it public. No key is required to detect such watermark. We combine data integrity technique and the unique characteristics in the design of intellectual property such that adversaries can get almost no advantage for forgery from the public watermarking. This new technique is also compatible with the existing constraint-based watermarking techniques to enhance the strength of the watermark. We build the mathematical framework for the this approach based on the concept of mutual exclusive constraints. We use several well-known problems to explain our approach, demonstrate its robustness against attacks, and show that there is little degradation in performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Adelsbach, B. Pfitzmann, and A. Sadeghi. “Proving Ownership of Digital Content”. The 3rd International Information Hiding Workshop, pp. 126–141, September 1999.
S. Craver. “Zero Knowledge Watermark Detection”. The 3rd International Information Hiding Workshop, pp. 102–115, September 1999.
F. Hartung and B. Girod. “Fast Public-Key Watermarking of Compressed Video”. IEEE International Conference on Image Processing, pp. 528–531, October 1997.
A. B. Kahng, et al. “Watermarking Techniques for Intellectual Property Protection”. 35th Design Automation Conference Proceedings, pp. 776–781, 1998.
J. Lach, W. H. Mangione-Smith, and M. Potkonjak. “Fingerprinting Digital Circuits on Programmable Hardware”. The 2nd International Information Hiding Workshop, pp. 16–31, April 1998.
B. Pfitzmann. “Information Hiding Terminology”, The 1st International Information Hiding Workshop, pp. 347–350, May 1996.
G. Qu and M. Potkonjak. “Hiding Signatures in Graph Coloring Solutions”. The 3rd International Information Hiding Workshop, pp. 391–408, September 1999.
Virtual Socket Interface Alliance. “Intellectual Property Protection White Paper: Schemes, Alternatives and Discussion Version 1.0–, September 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qu, G. (2001). Keyless Public Watermarking for Intellectual Property Authentication. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_8
Download citation
DOI: https://doi.org/10.1007/3-540-45496-9_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42733-9
Online ISBN: 978-3-540-45496-0
eBook Packages: Springer Book Archive