Abstract
Watermarking security has emerged in the last years as as a new subject in the watermarking area. As it brings new challenges to the design of watermarking systems, a good understanding of the problem is fundamental. This paper is intended to clarify the concepts related to watermarking security, provide an exhaustive literature overview, and serve as a starting point for newcomers interested in carrying out research on this topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bartolini, F., Barni, M., Furon, T.: Security issues in digital watermarking. In: Proc. of 11th European Signal Processing Conference (EUSIPCO), Toulouse, France, vol. 1, pp. 282–302, 441–461 (2002)
Barni, M., Pérez-González, F.: Special session: watermarking security. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, vol. 5681, pp. 685–768. SPIE (2005)
Barni, M., Pérez-González, F.: Tutorial: Security issues in digital watermarking. In: IEEE International Conference on Image Processing (ICIP), Genova, Italy (2005)
Pérez-González, F., Furon, T.: Special session on watermarking security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–274. Springer, Heidelberg (2005)
CERTIMARK: Certification of Watermarking Techniques (2000-2002), http://www.certimark.org
ECRYPT: European Network of Excellence in Cryptology (2004-2008), http://www.ecrypt.eu.org
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Multimedia Information and Systems. Morgan Kauffman, San Francisco (2002)
Barni, M., Bartolini, F.: Watermarking Systems Engineering. In: Signal Processing and Communications. Marcel Dekker, New York (2004)
Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)
Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87, 1062–1078 (1999)
van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proc. IEEE Int. Conference on Image Processing, Austin, Texas, USA, pp. 86–89 (1994)
Viterbi, A.: CDMA: principles of spread spectrum communication. Addison Wesley Longman Publishing Co., Inc, Redwood City (1995)
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Hernández, J.R., Pérez-González, F., Rodríguez, J.M., Nieto, G.: Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16, 510–524 (1998)
Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: Proc. IEEE ICIP 1997, Santa Barbara, California, USA, vol. 1, pp. 528–531 (1997)
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of the SPIE, San Jose, CA, pp. 2420–2440 (1995)
Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Digital Media and Electronc Publishing, pp. 203–213. Academic Press, London (1996)
Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proc. International Conference on Imaging Science, Systems, and Technology, Las Vegas, NV, USA, pp. 237–243 (1999)
Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Elsevier Signal Processing 83, 2095–2116 (2003)
Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., Etri, T.: A secure watermarking for JPEG 2000. In: Proc. IEEE Int. Conf. Image Processing, Thessaloniki, Greece, vol. 2, pp. 530–533 (2001)
Wang, Y., Doherty, J., Dyck, R.V.: A wavelet-based watermarking algorithm for ownership verificationof digital images. IEEE Trans. on Image Processing 11, 77–88 (2002)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)
Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. Multimedia, IEEE Transactions 4, 551–560 (2002)
Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digital image domain. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, USA, vol. 2, pp. 432–436 (1998)
Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int. Conf. Image Processing, Laussane, Switzerland, vol. 2, pp. 237–240. Laussane, Switzerland (1996)
Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51, 898–905 (2003)
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)
Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51, 1003–1019 (2003) (Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery)
Fei, C., Kundur, D., Kwong, R.H.: Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 1, 43–55 (2006)
Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing 53, 3960–3975 (2005) (Third supplement on secure media)
Moulin, P., Goteti, A.K.: Minmax strategies for QIM watermarking subject to attacks with memory. In: IEEE International Conference on Image Processing, ICIP 2005, Genova, Italy, vol. 1, pp. 985–988 (2005)
Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP 2002, Rochester, NY, USA, vol. 3, pp. 153–156 (2002)
Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermarking. IEEE Transactions on Image Processing 13, 792–807 (2004)
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)
Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)
Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan, R.E.: Resistance of watermarked documents to collusional attacks. Technical report, NEC Research Institute, Princeton, NJ (1997)
Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)
Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, Springer, Heidelberg (1998)
Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)
Kalker, T.: Considerations on watermarking security. In: IEEE International Workshop on Multimedia Signal Processing, Cannes, France, pp. 201–206 (2001)
Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–684 (1976)
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003) (Special issue on Security of Data Hiding Technologies, invited paper)
Barni, M., Bartolini, F., Rosa, A.D.: Advantages and drawbacks of multiplicative spread spectrum watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents V. Proceedings of SPIE, pp. 290–299 (2003)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)
Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222, 309–368 (1922)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. In: 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland (2005)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)
Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)
Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.: Security of lattice-based data hiding against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Accepted for publication (2006)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)
Hernández, J.R., Pérez-González, F.: Shedding More Light on Image Watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 191–207. Springer, Heidelberg (1998)
Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans 52, 2955–2964 (2004)
Katzenbeisser, S.: Computational security models for digital watermarks. In: Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland (2005)
Cramér, H.: Mathematical methods of statistics. Landmarks on Mathematics. Princeton University Press, Princeton (reprint, 1999)
Guo, D., Shamai, S., Verdú, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Transactions on Information Theory 51, 1261–1282 (2005)
Guo, D., Shamai, S., Verdú, S.: Additive non-Gaussian noise channels: Mutual information and conditional mean estimation. In: IEEE International Symposium on Information Theory (ISIT), Adelaide, Australia, pp. 719–723 (2005)
Palomar, D.P., Verdú, S.: Gradient of mutual information in linear vector Gaussian channels. IEEE Transactions on Information Theory 52, 141–154 (2006)
Bas, P., Cayre, F.: Natural Watermarking: A Secure Spread Spectrum Technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1–14. Springer, Heidelberg (2007)
Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. In: Adaptive and learning systems for signal processing, communications and control, John Wiley & Sons, Chichester (2001)
Moulin, P., Koetter, R.: Data hiding codes. Proceedings of IEEE 93, 2083–2126 (2005)
Pérez-Freire, L., Pérez-González, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, California, USA, SPIE (2006)
Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups, 3rd edn. Comprehensive Studies in Mathematics, vol. 290. Springer, Heidelberg (1999)
Costa, M.H.: Writing on dirty paper. IEEE Trans. on Information Theory 29, 439–441 (1983)
Burgett, S., Koch, E., Zhao, J.: Copyright labeling of digitized image data. IEEE Communications Magazine 36, 94–100 (1998)
Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4, 551–560 (2002)
Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Petitcolas, F.A.P. (ed.) 5th International Workshop on Digital Watermarking, Noordwijkerhout, The Netherlands, pp. 226–246. Springer, Heidelberg (2002)
Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modeling: Towards a second generation benchmark. Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking 81, 1177–1214 (2001)
Hyvärinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks 13, 411–430 (2000)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, Springer, Heidelberg (2005)
Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B (Methodological) 39, 1–38 (1977)
Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Canada, vol. 3, pp. 93–96 (2004)
Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, Springer, Heidelberg (2003)
Combettes, P.L.: The foundations of set theoretic estimation. Proceedings of the IEEE 81, 182–208 (1993)
Deller, J.R.: Set membership identification in digital signal processing. IEEE ASSP Magazine 6, 4–20 (1989)
Cheung, M.F., Yurkovich, S., Passino, K.M.: An optimal volume ellipsoid algorithm for parameter set estimation. IEEE Transactions on Automatic Control 38, 1292–1296 (1993)
Bas, P., Hurri, J.: Security of DM quantization watermarking schemes: a practical study for digital images. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 186–200. Springer, Heidelberg (2005)
Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. In: Proc. of Security and Watermarking of Multimedia Contents VI, San Jose, CA, USA. Proceedings of SPIE, pp. 70–82 (2004)
Westfeld, A.: High capacity despite better steganalysis (F5-A steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA, pp. 323–336 (2001)
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proc. of Security and Watermarking of Multimedia Contents VII, San Jose, CA, USA. Proceedings of SPIE (2005)
Fridrich, J., Goljan, M., Soukal, D., Memon, N.: Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proc. of Security and Watermarking of Multimedia Contents II, San Jose, CA, USA. Proceedings of SPIE, pp. 428–437 (2000)
Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP 1998, Chicago, IL, USA, pp. 425–429 (1998)
El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia contents VII, January 2005, pp. 734–745 (2005)
Mansour, M.F., Tewfik, A.H.: LMS-based attack on watermark public detectors. In: IEEE International Conference on Image Processing, ICIP 2002, vol. 3, pp. 649–652 (2002)
Venturini, I.: Oracle attacks and covert channels. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 171–185. Springer, Heidelberg (2005)
Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII. SPIE, vol. 6072 (2006)
Venkatesan, R., Jakubowski, M.H.: Randomized detection for spread-spectrum watermarking: defending against sensitivity and other attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Philadelphia, USA, vol. 2, pp. 9–12 (2005)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The return of the sensitivity attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)
Holliman, M., Memon, N., Yeung, M.: On the need for image dependent keys for watermarking. In: Proceedings of IEEE Content Security and Data Hiding in Digital Media, Newark, NJ, USA (1999)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, pp. 173–178 (2000)
Smith, J.R., Dodge, C.: Developments in steganography. In: Information Hiding, pp. 77–87 (1999)
Miller, M.L.: Is asymmetric watermarking necessary or sufficient? In: Proc. XI European Signal Processing Conference, EUSIPCO 2002, pp. 291–294 (2002)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)
Choi, H., Lee, K., Kim, T.: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 11, 251–254 (2004)
Kim, T.Y., Choi, H., Lee, K., Kim, T.: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Letters 11, 375–377 (2004)
van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: IEEE International Conference on Multimedia Computing Systems (ICMCS 1999), Florence, pp. 580–585 (1999)
Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, Tampere, Finland (2000)
Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Mediendaten, Springer Reihe, Informatik Aktuell (Invited paper, 2000)
Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) Proc. of the third Int. Workshop on Information Hiding, Dresden, Germany, pp. 88–100. Springer, Heidelberg (1999)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003): Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Wong, P.W., Delp III, E.J. (eds.) Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)
Furon, T.: Use of watermarking techniques for copy protection. PhD thesis, Ecole Nationale Supérieure des Télécommunications (2002)
Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, San José, CA, USA. Proc. of SPIE, vol. 4675, pp. 102–109 (2002)
Mansour, M.F., Tewfik, A.H.: Secure detection of public watermarks with fractal decision boundary. In: Proc. XI European Signal Processing Conference, Toulouse, France (2002)
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pp. 291–304 (1985)
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal of Computing 18, 186–208 (1989)
Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37, 156–189 (1988)
Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)
Goldreich, O., Petrank, E.: Quantifying knowledge complexity. Computational Complexity 8, 50–98 (1999)
Gopalakrishnan, K., Memon, N.D., Vora, P.: Protocols for watermark verification. In: Multimedia and Security Workshop at ACM Multimedia, pp. 91–94 (1999)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–176 (1978)
Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)
Pitas, I.: A method for signature casting on digital images. In: Proceedings of ICIP, vol. 3, pp. 215–218 (1996)
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure. In: XI European Signal Processing Conference, vol. I, pp. 446–449 (2003)
Damgård, I.B.: Commitment Schemes and Zero-Knowledge Protocols. In: Damgård, I.B. (ed.) EEF School 1998. LNCS, vol. 1561, Springer, Heidelberg (1999)
Schneier, B.: Applied cryptography. Computer Networking and Distributed Systems. John Wiley & Sons, Chichester (1994)
Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 32–46. Springer, Heidelberg (1998)
Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)
Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San José, California, USA. SPIE (2006)
Katzenbeisser, S.: On the integration of watermarks and cryptography. In: International Workshop on Digital Watermarking, pp. 50–60 (2003)
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Overcoming the obstacles of zero-knowledge watermark detection. In: Proceedings of Multimedia and Security Workshop, pp. 46–55 (2004)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (5th reprint, 2001)
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-interactive watermark detection for a correlation-based watermarking scheme. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 129–139. Springer, Heidelberg (2005)
Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53, 824–833 (2005)
Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, California, USA. SPIE, vol. 4675, pp. 50–56 (2002)
Cachin, C.: An information-theoretic model for steganography. Information and Computation 192, 41–56 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pérez-Freire, L., Comesaña, P., Troncoso-Pastoriza, J.R., Pérez-González, F. (2006). Watermarking Security: A Survey. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926214_2
Download citation
DOI: https://doi.org/10.1007/11926214_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49071-5
Online ISBN: 978-3-540-49072-2
eBook Packages: Computer ScienceComputer Science (R0)