Skip to main content

An Implementation of, and Attacks on, Zero-Knowledge Watermarking

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3200))

Abstract

A problem of considerable theoretical interest in digital watermarking is that of asymmetric, or zero-knowledge watermarking. In this problem, we wish to embed a watermark in a piece of multimedia and later prove that we have done so, but without revealing information that can be used by an adversary to remove the signal later.

In this paper we develop a watermarking system based on the ambiguity attack method outlined in [14], constructing a vector-based watermarking system applicable to images, audio and video. An example of image watermarking is provided. We also outline some important attacks and thus important design principles for asymmetric watermarking systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute (1995)

    Google Scholar 

  2. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships With Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection (April 1998) (IBM Research Report, RC 20755, March 1997)

    Google Scholar 

  3. Hachez, G., Quisquater, J.-J.: Which directions for asymmetric watermarking? In: Proceedings of EUSIPCO (Toulouse, France (September 2002)

    Google Scholar 

  4. Craver, S., Katzenbeisser, S.: Security Analysis of Public-Key Watermarking Schemes. In: Proceedings of SPIE, Mathematics of Data/Image Coding, Compression and Encryption IV, July 2001, vol. 4475, pp. 172–182 (2001)

    Google Scholar 

  5. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  6. Hartung, F.H., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE, San Jose, CA, February 1999, pp. 147–158 (1999)

    Google Scholar 

  7. Hartung, F.H., Girod, B.: Fast Public-Key Watermarking of Compressed Video. In: Proceedings of IEEE International Conference on Speech and Signal Processing (1997)

    Google Scholar 

  8. Salomaa, A.: Public-Key Cryptography, 2nd edn. Springer, Berlin (1996)

    MATH  Google Scholar 

  9. Viega, J., Girouard, Z., Messier, M.: Secure Programming Cookbook. O’Reilly, Sebastopol (2003)

    Google Scholar 

  10. Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)

    MATH  Google Scholar 

  11. Schneier, B.: Applied Cryptograpy: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)

    MATH  Google Scholar 

  12. Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proceedings of IS&T PIC Conference (Portland, OR) (May 1998)

    Google Scholar 

  13. Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proceedings of ICIP, Santa Barbara, CA, October 1997, IEEE press, Los Alamitos (1997)

    Google Scholar 

  14. Craver, S.: Zero Knowledge Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Adelsbach, A., Sadeghi, A.-R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Craver, S., Liu, B., Wolf, W. (2004). An Implementation of, and Attacks on, Zero-Knowledge Watermarking. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30114-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24207-9

  • Online ISBN: 978-3-540-30114-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics