Watermark detection schemes with high security

In traditional watermark detection, a prover exposes the secret information that can be used to remove the watermark to the possible dishonest verifier in order to prove a watermark presents in a digital data. This is a significant security risk because a potential attacker is able to remove the watermark once secret information like watermark or embedding key is known. Some of previous schemes proposed as solution haven't achieved desirable result really. Their lacking of security and validity is the most severe problem. In this paper, we propose the watermark detection schemes with high security, which are based on zero knowledge protocol and public-key encryption scheme, for both blind watermark scheme and non-blind watermark scheme. These two schemes provide copyright proving without revealing any information that can be used for removing watermark during the detection process. Both security and validity of watermark detection can be significantly improved using these two schemes.

[1]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  Paul Douglas,et al.  Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[4]  Stefan Katzenbeisser,et al.  Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.

[5]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[6]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[7]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[8]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[9]  Hirotsugu Kinoshita An image digital signature system with ZKIP for the graph isomorphism , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Stefan Katzenbeisser,et al.  Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept , 2001, Communications and Multimedia Security.

[11]  Scott Craver Zero Knowledge Watermark Detection , 1999, Information Hiding.

[12]  Ahmad-Reza Sadeghi,et al.  Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.

[13]  Stefan Katzenbeisser,et al.  Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.

[14]  Ralf Steinmetz,et al.  Multimedia and Security Workshop at ACM Multimedia , 1998 .