Skip to main content

Asymmetric Watermarking Schemes

  • Conference paper
Sicherheit in Netzen und Medienströmen

Part of the book series: Informatik aktuell ((INFORMAT))

Abstract

Unauthorized copying and distribution of digital data is a severe problem in protecting intellectual property rights. The embedding of digital watermarks into multimedia content has been proposed to tackle this problem, and many different schemes have been presented in the last years. However, almost all of them are symmetric, meaning the key used for watermark embedding must be available at the watermark detector. This leads to a security problem if the detectors are implemented in consumer devices that are spread all over the world. Therefore, the development of asymmetric schemes becomes important. In such a scheme the detector only needs to know a public key, which does not give enough information to make watermark removal possible. In this paper, we review recent proposals for asymmetric watermarking and analyze their performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Chen and G. W. Wornell. Digital watermarking and information embedding using dither modulation. In Proc. of IEEE Workshop on Multimedia Signal Processing, Redondo Beach, CA, USA, December 1998.

    Google Scholar 

  2. B. Chen and G. W. Wornell. Dither modulation: a new approach to digital watermarking and information embedding. In Proc. of SPIE Vol. 3657: Security and Watermarking of Multimedia Contents, San Jose, January 1999.

    Google Scholar 

  3. I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12): 1673–1687, 1997.

    Article  Google Scholar 

  4. I.J. Cox and J.-P. Linnartz. Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications, 16:587–593, May 1998.

    Article  Google Scholar 

  5. J. J. Eggers and B. Girod. Robustness of Public Key Watermarking Schemes. In V3D2 Watermarking Workshop, Erlangen, Germany, October 1999.

    Google Scholar 

  6. J. J. Eggers, J. K. Su, and B. Girod. Public Key Watermarking by Eigenvectors of Linear Transforms. In Proc. of European Signal Processing Conf, Tampere, Finland, April 2000. To appear.

    Google Scholar 

  7. T. Furon and P. Duhamel. An Asymmetric Public Detection Watermarking Technique. In Workshop on Information Hiding, Dresden, Germany, October 1999.

    Google Scholar 

  8. T. Furon and P. Duhamel. Copy Protection of Distributed Contents: An Application of Watermarking Technique. In Workshop COST 254: Friendly Exchange through the net, Bordeaux, France, March 2000.

    Google Scholar 

  9. T. Furon, N. Moreau, and P. Duhamel. Audio Public Key Watermarking Technique. In Proc. of the IEEE Intl. Conf. on Speech and Signal Processing 2000, Istanbul, Turkey, June 2000. To appear.

    Google Scholar 

  10. F. Härtung and B. Girod. Fast Public-Key Watermarking of Compressed Video. In Proc. of the IEEE Intl. Conf. on Image Processing 1997, Santa Barbara, CA, USA, October 1997.

    Google Scholar 

  11. F. Härtung and B. Girod. Watermarking of uncompressed and compressed video. Signal Processing, 66(3):283–301, May 1998.

    Article  Google Scholar 

  12. R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proc. of the IEEE Intl. Conf on Multimedia Computing and Systems, volume 1, Florence, Italy, June 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Eggers, J.J., Su, J.K., Girod, B. (2000). Asymmetric Watermarking Schemes. In: Schumacher, M., Steinmetz, R. (eds) Sicherheit in Netzen und Medienströmen. Informatik aktuell. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-58346-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-58346-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67926-4

  • Online ISBN: 978-3-642-58346-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics