Verifiable Text Watermarking Detection to Improve Security

Digital watermarking technology plays an important role in the areas of copyright protection and identity tracing for owners of digital mediums. At present, the security of the watermarking scheme is facing a great threat. The security of a digital watermarking scheme must not depend on the scheme being kept secret. Zero knowledge-based watermark detection scheme (ZKWD) can achieve this aim. For ZKWD scheme, an owner can provide prove to a verifier that a digital medium in question indeed contains the owner’s watermark information without revealing any secret key and watermark-related information. However, the existing ZKWD protocols are still facing some challenging problems, such as ambiguity attacks. In this paper, a public ZKWD protocol is proposed for plain text, and the homomorphic property of asymmetric encryption algorithm in the multiplication operation is used to prevent the owner from cheating by ambiguity attacks. Compared with existing methods, the security of our proposed ZKWD scheme is improved by using the improved feature extraction algorithm.

[1]  Zheng Yuan,et al.  A Digital Signature Schemes Without Using One-way Hash and Message Redundancy and Its Application on Key Agreement , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[2]  Non Thiranant,et al.  A Design of e-Healthcare Authentication Framework with QR Code , 2014 .

[3]  Chun-Shien Lu,et al.  Content-Dependent Anti-disclosure Image Watermark , 2003, IWDW.

[4]  Scott Craver Zero Knowledge Watermark Detection , 1999, Information Hiding.

[5]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[6]  Bo Li,et al.  Text split-based steganography in OOXML format documents for covert communication , 2012, Secur. Commun. Networks.

[7]  Zou Xiao Zero Knowledge Watermark Verification Protocols , 2003 .

[8]  Chun-Shien Lu,et al.  Robust non-interactive zero-knowledge watermarking scheme against cheating prover , 2005, MM&Sec '05.

[9]  Zhihua Xia,et al.  Invertible Transform-Based Reversible Text Watermarking , 2010 .

[10]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[11]  Fernando Pérez-González,et al.  Zero-knowledge watermark detector robust to sensitivity attacks , 2006, MM&Sec '06.

[12]  Parviz Keshavarzi,et al.  A New Left-to-Right Scalar Multiplication Algorithm Using a New Recoding Technique , 2014 .

[13]  Stefan Katzenbeisser,et al.  Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.

[14]  Xingming Sun,et al.  Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.

[15]  Jana Dittmann,et al.  Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .

[16]  Ivan Damgård,et al.  Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.

[17]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[18]  Hirotsugu Kinoshita An image digital signature system with ZKIP for the graph isomorphism , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[19]  Stefan Katzenbeisser,et al.  Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.

[20]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[21]  Zhihua Xia,et al.  Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).