Zero Knowledge Watermark Detection

In order for digital watermarking technology to be truly usable, one must be able to employ it without annihilating its effect. The act of revealing a watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of zero-knowledge watermarking, of proving the existence of a mark without revealing what that mark is, can help address this problem and others.

[1]  J. Culberson,et al.  The Gn,m Phase Transition is Not Hard for the Hamiltonian Cycle Problem , 1998, J. Artif. Intell. Res..

[2]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[3]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[4]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[5]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[6]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[7]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[8]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[9]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[11]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[12]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .