Paper
5 December 2001 Security analysis of public key watermarking schemes
Author Affiliations +
Abstract
Traditional watermarking systems require the complete disclosure of the watermarking key in the watermark verification process. In most systems an attacker is able to remove the watermark completely once the key is known, thus subverting the intention of copyright protection. To cope with this problem, public-key watermarking schemes were proposed that allow asymmetric watermark detection. Whereas a public key is used to insert watermarks in digital objects, the marks can be verified with a private key. Knowledge of this private key does not allow piracy. We describe two public-key watermarking schemes which are similar in spirit to zero-knowledge proofs. The key idea of one system is to verify a watermark in a blinded version of the document, where the scrambling is determined by the private key. A probabilistic protocol is constructed that allows public watermark detection with probability of 1/2; by iteration, the verifier can get any degree of certainty that the watermark is present. The second system is based on watermark attacks, using controlled counterfeiting to conceal real watermark data safely amid data useless to an attacker.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Scott A. Craver and Stefan Katzenbeisser "Security analysis of public key watermarking schemes", Proc. SPIE 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, with Applications, (5 December 2001); https://doi.org/10.1117/12.449579
Lens.org Logo
CITATIONS
Cited by 25 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Sensors

Video

Information security

Signal processing

Computer security

Algorithms

RELATED CONTENT

Next generation DRM: cryptography or forensics?
Proceedings of SPIE (February 04 2009)
Temporal synchronization in video watermarking
Proceedings of SPIE (April 29 2002)
Two different approaches for attacking BOWS
Proceedings of SPIE (February 27 2007)
Watermarking security part two: Practice
Proceedings of SPIE (March 21 2005)
Collusion issue in video watermarking
Proceedings of SPIE (March 21 2005)

Back to Top