[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security Models of Digital Watermarking

  • Conference paper
Multimedia Content Analysis and Mining (MCAM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4577))

Included in the following conference series:

Abstract

Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adelsbach, A., Katzenbeiser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Proceedings of the 2003 ACM Workshop on Digital Rights Management, pp. 111–119 (2003)

    Google Scholar 

  2. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, Springer, Heidelberg (2004)

    Google Scholar 

  3. Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Barr, J., Bradley, B., Hanningan, B.T.: Using digital watermarks with image signatures to mitigate the threat of the copy attack. In: ICASSP, pp. 69–72 (2003)

    Google Scholar 

  5. Break our watermarking system contest, http://lci.det.unifi.it/BOWS/

  6. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  7. Hopper, N., Molnar, D., Wagner, D.: From weak to strong watermarking. In: Theory of Cryptography Conference (2007), http://eprint.iacr.org/2006/430

  8. Kutter, M., Voloshynovskiy, S., Herrigel, A.: The watermark copy attack. In: Electronic Imaging 2000, Security and Watermarking of Multimedia Content II, vol. 3971 (2000)

    Google Scholar 

  9. Li, Q., Chang, E.-C.: On the possibility of non-invertible watermarking schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 13–24. Springer, Heidelberg (2004)

    Google Scholar 

  10. Li, Q., Chang, E.-C.: Zero-knowledge watermark detection resistant to ambiguity attacks. In: ACM Multimedia Security Workshop (2006)

    Google Scholar 

  11. Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)

    Article  Google Scholar 

  12. Ramkumar, M., Akansu, A.: Image watermarks and counterfeit attacks: Some problems and solutions. In: Symposium on Content Security and Data Hiding in Digital Media, pp. 102–112 (1999)

    Google Scholar 

  13. Sencar, H.T., Memon, N.: Combatting ambiguity attacks via selected detection of embedded watermarks. IEEE Transactions on Information Forensics and Security

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Nicu Sebe Yuncai Liu Yueting Zhuang Thomas S. Huang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Li, Q., Memon, N. (2007). Security Models of Digital Watermarking. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds) Multimedia Content Analysis and Mining. MCAM 2007. Lecture Notes in Computer Science, vol 4577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73417-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73417-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73416-1

  • Online ISBN: 978-3-540-73417-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics