Advertisement

A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems

  • Xianfeng Zhao
  • Yingxia Dai
  • Dengguo Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

Zero-knowledge watermark proof systems for copyright verification are not only theoretically appealing but also practically possible. However, most existing proposals concentrate on specific skills and neglect to give a formal proof of their zero-knowledge property. To improve the situation, the paper proposes a generalized framework for constructing and validating such systems. First, the theoretical foundations are investigated. Second, the paper shows that the existence of a secured equivalent operation, which enables watermark detection in a blinded domain, is one of the prerequisites of the systems’ existence. In this view, the paper constructs a generalized zero-knowledge watermark proof system and verifies its zero-knowledge property. Third, the existing systems are investigated under the above framework, and a new system, which overcomes some defects of the existing ones, is proposed as a concrete instance of applying the generalized methods.

Keywords

Error Probability Reverse Engineering Watermark Scheme Interactive Proof Watermark Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data, a state-of-the-art overview. IEEE Signal Processing Magazine 17(5), 20–46 (2000)CrossRefGoogle Scholar
  2. 2.
    Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Proc. of Sicherheit in Netzen and Mediendaten, Berlin, Germany (September 2000)Google Scholar
  3. 3.
    Craver, S., Katzenbeisser, S.: Security analysis of public-key watermarking schemes. In: SPIE Proc. of Mathematics of Data/Image Coding, Compression and Encryption, with Applications, vol. 4475, pp. 172–182 (2001)Google Scholar
  4. 4.
    Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 102–116. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems 9, 266–278 (2003)CrossRefGoogle Scholar
  6. 6.
    Goldreich, O.: Foundations of Cryptography, Basic Tools. Cambridge University Press, Cambridge (2001)CrossRefzbMATHGoogle Scholar
  7. 7.
    Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimedia 8(4), 66–70 (2001)CrossRefGoogle Scholar
  9. 9.
    Then, H.H.P., Wang, Y.C.: Towards generic detection scheme in zero knowledge protocol. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 570–580. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)CrossRefGoogle Scholar
  11. 11.
    Sipser, M.: Introduction to the Theory of Computation. In: Thomson Learning, Stamford, Connecticut, USA (1997)Google Scholar
  12. 12.
    Barni, M., Bartolini, F., Capellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing 66, 357–372 (1998)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xianfeng Zhao
    • 1
  • Yingxia Dai
    • 1
  • Dengguo Feng
    • 1
  1. 1.The State Key Laboratory of Information SecurityGraduate School of Chinese Academy of SciencesBeijingP. R. China

Personalised recommendations