Advertisement

Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs

  • Raphael C. -W. Phan
  • Huo-Chong Ling
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

Recently, two generic watermarking protocols were proposed, based on a popular zero-knowledge identification protocol. In this paper, we show that both protocols are flawed and therefore fail to achieve their purpose of allowing a prover to prove to a verifier of his ownership of a watermarked image. We also give some suggestions to fix these flaws.

Keywords

Watermark detection protocol generic zero knowledge proof identification flaws 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adelsbach, A., Sadeghi, A.-R.: Zero Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  3. 3.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
  4. 4.
    Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. In: 19th Annual ACM Symposium on the Theory of Computing, pp. 210–217 (1987)Google Scholar
  5. 5.
    Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. Journal of Cryptology 1(2), 77–94 (1988)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87, 1079–1107 (1999)CrossRefGoogle Scholar
  7. 7.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  8. 8.
    Pfitzman, B., Sadeghi, A.R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–163. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  9. 9.
    Pfitzman, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  10. 10.
    Pfitzman, B., Waidner, W.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  11. 11.
    Quisquater, J.-J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1990)Google Scholar
  12. 12.
    Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Chichester (1996)zbMATHGoogle Scholar
  14. 14.
    Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)CrossRefGoogle Scholar
  15. 15.
    Then, P.H.H., Wang, Y.C.: Towards Generic Zero Knowledge Protocol for Blind Watermark Detection. In: International Conference on IT in Asia (CITA 2003), pp. 278–282 (2003)Google Scholar
  16. 16.
    Then, H.H.P., Wang, Y.C.: Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 570–580. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  17. 17.
    Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proc. IEEE 87, 1197–1207 (1999)CrossRefGoogle Scholar
  18. 18.
    Wagner, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 18–22 (1983)Google Scholar
  19. 19.
    Wolfang, R., Podilchuk, C., Delp, E.: Perceptual Watermarks for Digital Images and Video. Proc. IEEE 87, 1108–1126 (1999)CrossRefGoogle Scholar
  20. 20.
    Zhao, J., Koch, E.: Embedding Robust Labels Into Images For Copyright Protection. In: International Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies, Vienna (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Raphael C. -W. Phan
    • 1
  • Huo-Chong Ling
    • 2
  1. 1.Information Security Research (iSECURES) LabSwinburne University of Technology (Sarawak Campus)KuchingMalaysia
  2. 2.Center for Cryptography & Information Security (CCIS), Faculty of EngineeringMultimedia UniversityCyberjayaMalaysia

Personalised recommendations