[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Abstract

Watermarking security has emerged in the last years as as a new subject in the watermarking area. As it brings new challenges to the design of watermarking systems, a good understanding of the problem is fundamental. This paper is intended to clarify the concepts related to watermarking security, provide an exhaustive literature overview, and serve as a starting point for newcomers interested in carrying out research on this topic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bartolini, F., Barni, M., Furon, T.: Security issues in digital watermarking. In: Proc. of 11th European Signal Processing Conference (EUSIPCO), Toulouse, France, vol. 1, pp. 282–302, 441–461 (2002)

    Google Scholar 

  2. Barni, M., Pérez-González, F.: Special session: watermarking security. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, vol. 5681, pp. 685–768. SPIE (2005)

    Google Scholar 

  3. Barni, M., Pérez-González, F.: Tutorial: Security issues in digital watermarking. In: IEEE International Conference on Image Processing (ICIP), Genova, Italy (2005)

    Google Scholar 

  4. Pérez-González, F., Furon, T.: Special session on watermarking security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. CERTIMARK: Certification of Watermarking Techniques (2000-2002), http://www.certimark.org

  6. ECRYPT: European Network of Excellence in Cryptology (2004-2008), http://www.ecrypt.eu.org

  7. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Multimedia Information and Systems. Morgan Kauffman, San Francisco (2002)

    Google Scholar 

  8. Barni, M., Bartolini, F.: Watermarking Systems Engineering. In: Signal Processing and Communications. Marcel Dekker, New York (2004)

    Google Scholar 

  9. Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  11. van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proc. IEEE Int. Conference on Image Processing, Austin, Texas, USA, pp. 86–89 (1994)

    Google Scholar 

  12. Viterbi, A.: CDMA: principles of spread spectrum communication. Addison Wesley Longman Publishing Co., Inc, Redwood City (1995)

    MATH  Google Scholar 

  13. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  14. Hernández, J.R., Pérez-González, F., Rodríguez, J.M., Nieto, G.: Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16, 510–524 (1998)

    Article  Google Scholar 

  15. Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: Proc. IEEE ICIP 1997, Santa Barbara, California, USA, vol. 1, pp. 528–531 (1997)

    Google Scholar 

  16. Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of the SPIE, San Jose, CA, pp. 2420–2440 (1995)

    Google Scholar 

  17. Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Digital Media and Electronc Publishing, pp. 203–213. Academic Press, London (1996)

    Google Scholar 

  18. Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proc. International Conference on Imaging Science, Systems, and Technology, Las Vegas, NV, USA, pp. 237–243 (1999)

    Google Scholar 

  19. Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Elsevier Signal Processing 83, 2095–2116 (2003)

    MATH  Google Scholar 

  20. Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., Etri, T.: A secure watermarking for JPEG 2000. In: Proc. IEEE Int. Conf. Image Processing, Thessaloniki, Greece, vol. 2, pp. 530–533 (2001)

    Google Scholar 

  21. Wang, Y., Doherty, J., Dyck, R.V.: A wavelet-based watermarking algorithm for ownership verificationof digital images. IEEE Trans. on Image Processing 11, 77–88 (2002)

    Article  Google Scholar 

  22. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)

    Google Scholar 

  23. Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. Multimedia, IEEE Transactions 4, 551–560 (2002)

    Article  Google Scholar 

  24. Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digital image domain. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, USA, vol. 2, pp. 432–436 (1998)

    Google Scholar 

  25. Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int. Conf. Image Processing, Laussane, Switzerland, vol. 2, pp. 237–240. Laussane, Switzerland (1996)

    Chapter  Google Scholar 

  26. Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51, 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  27. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  28. Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51, 1003–1019 (2003) (Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery)

    Article  MathSciNet  Google Scholar 

  29. Fei, C., Kundur, D., Kwong, R.H.: Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 1, 43–55 (2006)

    Article  Google Scholar 

  30. Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing 53, 3960–3975 (2005) (Third supplement on secure media)

    Article  Google Scholar 

  31. Moulin, P., Goteti, A.K.: Minmax strategies for QIM watermarking subject to attacks with memory. In: IEEE International Conference on Image Processing, ICIP 2005, Genova, Italy, vol. 1, pp. 985–988 (2005)

    Google Scholar 

  32. Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP 2002, Rochester, NY, USA, vol. 3, pp. 153–156 (2002)

    Google Scholar 

  33. Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermarking. IEEE Transactions on Image Processing 13, 792–807 (2004)

    Article  Google Scholar 

  34. Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  35. Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  36. Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)

    Article  Google Scholar 

  37. Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan, R.E.: Resistance of watermarked documents to collusional attacks. Technical report, NEC Research Institute, Princeton, NJ (1997)

    Google Scholar 

  38. Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)

    Google Scholar 

  39. Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  40. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  41. Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  42. Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  43. Kalker, T.: Considerations on watermarking security. In: IEEE International Workshop on Multimedia Signal Processing, Cannes, France, pp. 201–206 (2001)

    Google Scholar 

  44. Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)

    Google Scholar 

  45. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)

    Google Scholar 

  46. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–684 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  47. Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003) (Special issue on Security of Data Hiding Technologies, invited paper)

    Article  MATH  Google Scholar 

  48. Barni, M., Bartolini, F., Rosa, A.D.: Advantages and drawbacks of multiplicative spread spectrum watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents V. Proceedings of SPIE, pp. 290–299 (2003)

    Google Scholar 

  49. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  50. Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222, 309–368 (1922)

    Article  Google Scholar 

  51. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. In: 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland (2005)

    Google Scholar 

  52. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  53. Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  54. Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.: Security of lattice-based data hiding against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Accepted for publication (2006)

    Google Scholar 

  55. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)

    Google Scholar 

  56. Hernández, J.R., Pérez-González, F.: Shedding More Light on Image Watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 191–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  57. Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans 52, 2955–2964 (2004)

    Article  Google Scholar 

  58. Katzenbeisser, S.: Computational security models for digital watermarks. In: Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland (2005)

    Google Scholar 

  59. Cramér, H.: Mathematical methods of statistics. Landmarks on Mathematics. Princeton University Press, Princeton (reprint, 1999)

    Google Scholar 

  60. Guo, D., Shamai, S., Verdú, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Transactions on Information Theory 51, 1261–1282 (2005)

    Article  Google Scholar 

  61. Guo, D., Shamai, S., Verdú, S.: Additive non-Gaussian noise channels: Mutual information and conditional mean estimation. In: IEEE International Symposium on Information Theory (ISIT), Adelaide, Australia, pp. 719–723 (2005)

    Google Scholar 

  62. Palomar, D.P., Verdú, S.: Gradient of mutual information in linear vector Gaussian channels. IEEE Transactions on Information Theory 52, 141–154 (2006)

    Article  Google Scholar 

  63. Bas, P., Cayre, F.: Natural Watermarking: A Secure Spread Spectrum Technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1–14. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  64. Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. In: Adaptive and learning systems for signal processing, communications and control, John Wiley & Sons, Chichester (2001)

    Google Scholar 

  65. Moulin, P., Koetter, R.: Data hiding codes. Proceedings of IEEE 93, 2083–2126 (2005)

    Article  Google Scholar 

  66. Pérez-Freire, L., Pérez-González, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, California, USA, SPIE (2006)

    Google Scholar 

  67. Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups, 3rd edn. Comprehensive Studies in Mathematics, vol. 290. Springer, Heidelberg (1999)

    MATH  Google Scholar 

  68. Costa, M.H.: Writing on dirty paper. IEEE Trans. on Information Theory 29, 439–441 (1983)

    Article  MATH  Google Scholar 

  69. Burgett, S., Koch, E., Zhao, J.: Copyright labeling of digitized image data. IEEE Communications Magazine 36, 94–100 (1998)

    Article  Google Scholar 

  70. Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4, 551–560 (2002)

    Article  Google Scholar 

  71. Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Petitcolas, F.A.P. (ed.) 5th International Workshop on Digital Watermarking, Noordwijkerhout, The Netherlands, pp. 226–246. Springer, Heidelberg (2002)

    Google Scholar 

  72. Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modeling: Towards a second generation benchmark. Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking 81, 1177–1214 (2001)

    MATH  Google Scholar 

  73. Hyvärinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks 13, 411–430 (2000)

    Article  Google Scholar 

  74. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  75. Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B (Methodological) 39, 1–38 (1977)

    MATH  MathSciNet  Google Scholar 

  76. Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Canada, vol. 3, pp. 93–96 (2004)

    Google Scholar 

  77. Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, Springer, Heidelberg (2003)

    Google Scholar 

  78. Combettes, P.L.: The foundations of set theoretic estimation. Proceedings of the IEEE 81, 182–208 (1993)

    Article  Google Scholar 

  79. Deller, J.R.: Set membership identification in digital signal processing. IEEE ASSP Magazine 6, 4–20 (1989)

    Article  Google Scholar 

  80. Cheung, M.F., Yurkovich, S., Passino, K.M.: An optimal volume ellipsoid algorithm for parameter set estimation. IEEE Transactions on Automatic Control 38, 1292–1296 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  81. Bas, P., Hurri, J.: Security of DM quantization watermarking schemes: a practical study for digital images. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 186–200. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  82. Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. In: Proc. of Security and Watermarking of Multimedia Contents VI, San Jose, CA, USA. Proceedings of SPIE, pp. 70–82 (2004)

    Google Scholar 

  83. Westfeld, A.: High capacity despite better steganalysis (F5-A steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  84. Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA, pp. 323–336 (2001)

    Google Scholar 

  85. Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proc. of Security and Watermarking of Multimedia Contents VII, San Jose, CA, USA. Proceedings of SPIE (2005)

    Google Scholar 

  86. Fridrich, J., Goljan, M., Soukal, D., Memon, N.: Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proc. of Security and Watermarking of Multimedia Contents II, San Jose, CA, USA. Proceedings of SPIE, pp. 428–437 (2000)

    Google Scholar 

  87. Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  88. Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP 1998, Chicago, IL, USA, pp. 425–429 (1998)

    Google Scholar 

  89. El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia contents VII, January 2005, pp. 734–745 (2005)

    Google Scholar 

  90. Mansour, M.F., Tewfik, A.H.: LMS-based attack on watermark public detectors. In: IEEE International Conference on Image Processing, ICIP 2002, vol. 3, pp. 649–652 (2002)

    Google Scholar 

  91. Venturini, I.: Oracle attacks and covert channels. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 171–185. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  92. Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII. SPIE, vol. 6072 (2006)

    Google Scholar 

  93. Venkatesan, R., Jakubowski, M.H.: Randomized detection for spread-spectrum watermarking: defending against sensitivity and other attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Philadelphia, USA, vol. 2, pp. 9–12 (2005)

    Google Scholar 

  94. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The return of the sensitivity attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  95. Holliman, M., Memon, N., Yeung, M.: On the need for image dependent keys for watermarking. In: Proceedings of IEEE Content Security and Data Hiding in Digital Media, Newark, NJ, USA (1999)

    Google Scholar 

  96. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, pp. 173–178 (2000)

    Google Scholar 

  97. Smith, J.R., Dodge, C.: Developments in steganography. In: Information Hiding, pp. 77–87 (1999)

    Google Scholar 

  98. Miller, M.L.: Is asymmetric watermarking necessary or sufficient? In: Proc. XI European Signal Processing Conference, EUSIPCO 2002, pp. 291–294 (2002)

    Google Scholar 

  99. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  100. Choi, H., Lee, K., Kim, T.: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 11, 251–254 (2004)

    Article  Google Scholar 

  101. Kim, T.Y., Choi, H., Lee, K., Kim, T.: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Letters 11, 375–377 (2004)

    Article  Google Scholar 

  102. van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: IEEE International Conference on Multimedia Computing Systems (ICMCS 1999), Florence, pp. 580–585 (1999)

    Google Scholar 

  103. Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, Tampere, Finland (2000)

    Google Scholar 

  104. Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Mediendaten, Springer Reihe, Informatik Aktuell (Invited paper, 2000)

    Google Scholar 

  105. Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) Proc. of the third Int. Workshop on Information Hiding, Dresden, Germany, pp. 88–100. Springer, Heidelberg (1999)

    Google Scholar 

  106. Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003): Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.

    Article  MathSciNet  Google Scholar 

  107. Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Wong, P.W., Delp III, E.J. (eds.) Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)

    Google Scholar 

  108. Furon, T.: Use of watermarking techniques for copy protection. PhD thesis, Ecole Nationale Supérieure des Télécommunications (2002)

    Google Scholar 

  109. Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, San José, CA, USA. Proc. of SPIE, vol. 4675, pp. 102–109 (2002)

    Google Scholar 

  110. Mansour, M.F., Tewfik, A.H.: Secure detection of public watermarks with fractal decision boundary. In: Proc. XI European Signal Processing Conference, Toulouse, France (2002)

    Google Scholar 

  111. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pp. 291–304 (1985)

    Google Scholar 

  112. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal of Computing 18, 186–208 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  113. Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37, 156–189 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  114. Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)

    Google Scholar 

  115. Goldreich, O., Petrank, E.: Quantifying knowledge complexity. Computational Complexity 8, 50–98 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  116. Gopalakrishnan, K., Memon, N.D., Vora, P.: Protocols for watermark verification. In: Multimedia and Security Workshop at ACM Multimedia, pp. 91–94 (1999)

    Google Scholar 

  117. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–176 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  118. Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  119. Pitas, I.: A method for signature casting on digital images. In: Proceedings of ICIP, vol. 3, pp. 215–218 (1996)

    Google Scholar 

  120. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure. In: XI European Signal Processing Conference, vol. I, pp. 446–449 (2003)

    Google Scholar 

  121. Damgård, I.B.: Commitment Schemes and Zero-Knowledge Protocols. In: Damgård, I.B. (ed.) EEF School 1998. LNCS, vol. 1561, Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  122. Schneier, B.: Applied cryptography. Computer Networking and Distributed Systems. John Wiley & Sons, Chichester (1994)

    Google Scholar 

  123. Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 32–46. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  124. Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  125. Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San José, California, USA. SPIE (2006)

    Google Scholar 

  126. Katzenbeisser, S.: On the integration of watermarks and cryptography. In: International Workshop on Digital Watermarking, pp. 50–60 (2003)

    Google Scholar 

  127. Adelsbach, A., Rohe, M., Sadeghi, A.R.: Overcoming the obstacles of zero-knowledge watermark detection. In: Proceedings of Multimedia and Security Workshop, pp. 46–55 (2004)

    Google Scholar 

  128. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (5th reprint, 2001)

    Google Scholar 

  129. Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-interactive watermark detection for a correlation-based watermarking scheme. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 129–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  130. Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53, 824–833 (2005)

    Article  MathSciNet  Google Scholar 

  131. Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, California, USA. SPIE, vol. 4675, pp. 50–56 (2002)

    Google Scholar 

  132. Cachin, C.: An information-theoretic model for steganography. Information and Computation 192, 41–56 (2004)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pérez-Freire, L., Comesaña, P., Troncoso-Pastoriza, J.R., Pérez-González, F. (2006). Watermarking Security: A Survey. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926214_2

Download citation

  • DOI: https://doi.org/10.1007/11926214_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49071-5

  • Online ISBN: 978-3-540-49072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics