Abstract
Unauthorized copying and distribution of digital data is a severe problem in protecting intellectual property rights. The embedding of digital watermarks into multimedia content has been proposed to tackle this problem, and many different schemes have been presented in the last years. However, almost all of them are symmetric, meaning the key used for watermark embedding must be available at the watermark detector. This leads to a security problem if the detectors are implemented in consumer devices that are spread all over the world. Therefore, the development of asymmetric schemes becomes important. In such a scheme the detector only needs to know a public key, which does not give enough information to make watermark removal possible. In this paper, we review recent proposals for asymmetric watermarking and analyze their performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Chen and G. W. Wornell. Digital watermarking and information embedding using dither modulation. In Proc. of IEEE Workshop on Multimedia Signal Processing, Redondo Beach, CA, USA, December 1998.
B. Chen and G. W. Wornell. Dither modulation: a new approach to digital watermarking and information embedding. In Proc. of SPIE Vol. 3657: Security and Watermarking of Multimedia Contents, San Jose, January 1999.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12): 1673–1687, 1997.
I.J. Cox and J.-P. Linnartz. Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications, 16:587–593, May 1998.
J. J. Eggers and B. Girod. Robustness of Public Key Watermarking Schemes. In V3D2 Watermarking Workshop, Erlangen, Germany, October 1999.
J. J. Eggers, J. K. Su, and B. Girod. Public Key Watermarking by Eigenvectors of Linear Transforms. In Proc. of European Signal Processing Conf, Tampere, Finland, April 2000. To appear.
T. Furon and P. Duhamel. An Asymmetric Public Detection Watermarking Technique. In Workshop on Information Hiding, Dresden, Germany, October 1999.
T. Furon and P. Duhamel. Copy Protection of Distributed Contents: An Application of Watermarking Technique. In Workshop COST 254: Friendly Exchange through the net, Bordeaux, France, March 2000.
T. Furon, N. Moreau, and P. Duhamel. Audio Public Key Watermarking Technique. In Proc. of the IEEE Intl. Conf. on Speech and Signal Processing 2000, Istanbul, Turkey, June 2000. To appear.
F. Härtung and B. Girod. Fast Public-Key Watermarking of Compressed Video. In Proc. of the IEEE Intl. Conf. on Image Processing 1997, Santa Barbara, CA, USA, October 1997.
F. Härtung and B. Girod. Watermarking of uncompressed and compressed video. Signal Processing, 66(3):283–301, May 1998.
R. G. van Schyndel, A. Z. Tirkel, and I. D. Svalbe. Key independent watermark detection. In Proc. of the IEEE Intl. Conf on Multimedia Computing and Systems, volume 1, Florence, Italy, June 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eggers, J.J., Su, J.K., Girod, B. (2000). Asymmetric Watermarking Schemes. In: Schumacher, M., Steinmetz, R. (eds) Sicherheit in Netzen und Medienströmen. Informatik aktuell. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-58346-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-58346-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67926-4
Online ISBN: 978-3-642-58346-9
eBook Packages: Springer Book Archive