Abstract
Traditional watermarking systems require the complete disclosure of a watermarking key in the watermark verification process. In most systems, an attacker is able to remove the watermark completely once the key is known. We propose the use of public-key watermarking systems, systems in which a watermark is inserted using a private key but checked with a public key. A construction of such a scheme is given, which uses scrambled documents and so-called ownership tickets in the watermark verification process.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36
Chapter PDF
References
A. Adelsbach, B. Pfitzmann, A. Sadeghi, “Proving Ownership of Digital Content”, in Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 1768, 2000, pp. 117–133.
S. Craver, B-L. Yeo, and M. M. Yeung, “Multilinearization Data Structure for Image Browsing,” in Proceedings of SPIE vol. 3656, Storage and Retrieval of Image and Video Databases, February 1999, pp. 155–166.
J. J. Eggers, J. K. Su, B. Girod, “Asymmetric Watermarking Schemes”, in Sicherheit in Mediendaten, GMD Jahrestagung, Proceedings, Springer Verlag, 2000.
F. Hartung, B. Girod, “Fast Public-Key Watermarking of Compressed Video”, in International Conference on Image Processing (ICIP’97), vol. I, 1997, pp. 528–531.
F. Hartung, B. Girod, “Watermarking of Uncompressed and Compressed Video”, in Signal Processing, vol. 66, no. 3, May 1998, pp. 283–301.
S. Katzenbeisser, F. A. P. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Boston, London: Artech House, 2000.
H. Sagan, Space-Filling Curves. New York: Springer-Verlag, 1994.
B. Schneier, Applied Cryptography; Protocols, Algorithms and Source Code in C, Wiley, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Craver, S., Katzenbeisser, S. (2001). Copyright Protection Protocols Based on Asymmetric Watermarking. In: Steinmetz, R., Dittman, J., Steinebach, M. (eds) Communications and Multimedia Security Issues of the New Century. IFIP — The International Federation for Information Processing, vol 64. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35413-2_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-35413-2_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4811-6
Online ISBN: 978-0-387-35413-2
eBook Packages: Springer Book Archive