Skip to main content

On Watermarking Numeric Sets

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

Abstract

Digital Watermarking, [3] [4] [5] [6] [7] [8] [9] [11] [12] [16] [17] [18] can be summarized the technique of embedding un-detectable (un-perceivable) hidden information into data objects (i.e. images, audio, video, text) mainly to protect the data from unauthorized duplication and distribution by enabling provable rights over the content.

In the present paper we address the issue of rights protection in the framework of numeric data, through resilient information hiding. We’re looking into the fundamental problem of watermarking numeric collections and propose resilient algorithms. To the best of our knowledge there is no work specifically addressing the problem of watermarking this type of data. The wide area of applicability of the problem ranging from numeric database content to stock market analysis data, makes it especially intriguing when considering a generic solution and particularities of its various applications. Given a range of associated numeric constraints and assumptions we provide a solution and analyze associated attacks. Our solution is resilient to a multitude of attacks, including data re-sorting, subset selection (up to 40% data loss tolerance), linear data changes etc. Finally we present and discuss a proof-of-concept implementation of our algorithm.

Portions of this work were supported by Grants EIA-9903545, IIS-9985019 and IIS- 9972883 from the National Science Foundation, Contract N00014-02-1-0364 from the Office of Naval Research, and by sponsors of the Center for Education and Research in Information Assurance and Security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M.J. Atallah, V. Raskin (with M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik). Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Lecture Notes in Computer Science, Proc. 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania. Springer-Verlag, 2001.

    Google Scholar 

  2. Christian Collberg and Clark Thomborson. On the limits of software watermarking, August 1998.

    Google Scholar 

  3. Ingemar Cox, Jeffrey Bloom, and Matthew Miller. Digital watermarking. In Digital Watermarking. Morgan Kaufmann, 2001.

    Google Scholar 

  4. Ingemar J. Cox and Jean-Paul M. G. Linnartz. Public watermarks and resistance to tampering. In International Conference on Image Processing (ICIP’97), Santa Barbara, California, U.S.A., 26–29 October 1997. IEEE.

    Google Scholar 

  5. Ingemar J. Cox, Matt L. Miller, and A. L. McKellips. Watermarking as communications with side information. Proceedings of the IEEE (USA), 87(7):1127–1141, July 1999.

    Google Scholar 

  6. Edward J. Delp. Watermarking: Who cares? does it work?In Jana Dittmann, Petra Wohlmacher, Patrick Horster, and Ralf Steinmetz, editors, Multimedia and Security-Workshop at ACM Multimedia’98, volume 41 of GMD Report, pages 123–137, Bristol, United Kingdom, September 1998. ACM, GMD-Forschungszentrum Informationstechnik GmbH, Darmstadt, Germany.

    Google Scholar 

  7. Stefan Katzenbeisser (editor) and Fabien Petitcolas (editor). Information hiding techniques for steganography and digital watermarking. In Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2001.

    Google Scholar 

  8. Bob Ellis. Public policy: New on-line surveys: Digital watermarking. Computer Graphics, 33(1):39–39, February 1999.

    Article  Google Scholar 

  9. M. Kobayashi. Digital watermarking: Historical roots. IBM Research Report RT0199, IBM Japan, Tokyo, Japan, April 1997.

    Google Scholar 

  10. J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang. Experience with software watermarking. In Proceedings of ACSAC, 16th Annual Computer Security Applications Conference, pages 308–316, 2000.

    Google Scholar 

  11. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 218–238, Portland, Oregon, U.S.A., 1998. Springer-Verlag.

    Google Scholar 

  12. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, July 1999. Special issue on protection of multimedia content.

    Google Scholar 

  13. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking semistructures. In (submission for review), CERIAS TR 2001-54, 2002.

    Google Scholar 

  14. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating watermarking algorithms. In Proceedings of IEEE ITCC02, CERIAS TR 2001-55. IEEE Computer Society Press, 2002.

    Google Scholar 

  15. R. Venkatesan, V. Vazirani, and S. Sinha. A graph theoretic approach to software watermarking. In Proceedings of the Fourth International Hiding Workshop, IH01, 2001.

    Google Scholar 

  16. G. Voyatzis, N. Nikolaidis, and I. Pitas. Digital watermarking: an overview. In S. Theodoridis et al., editors, Signal processing IX, theories and applications: proceedings of Eusipco-98, Ninth European Signal Processing Conference, Rhodes, Greece, 8–11 September 1998, pages 9–12, Patras, Greece, 1998. Typorama Editions.

    Google Scholar 

  17. Jian Zhao and Eckhard Koch. A generic digital watermarking model. Computers and Graphics, 22(4):397–403, August 1998.

    Article  Google Scholar 

  18. Jian Zhao, Eckhard Koch, Joe O'Ruanaidh, and Minerva M. Yeung. Digital watermarking: what will it do for me? and what it won’t!In ACM, editor, SIGGRAPH 99. Proceedings of the 1999 SIGGRAPH annual conference: Conference abstracts and applications, Computer Graphics, pages 153–155, New York, NY 10036, USA, 1999. ACM Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sion, R., Atallah, M., Prabhakar, S. (2003). On Watermarking Numeric Sets. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics