Skip to main content

Zero Knowledge Watermark Detection

  • Conference paper
Information Hiding (IH 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Included in the following conference series:

Abstract

In order for digital watermarking technology to be truly usable, one must be able to employ it without annihilating its effect. The act of revealing a watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of zero-knowledge watermarking, of proving the existence of a mark without revealing what that mark is, can help address this problem and others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39–48. Springer, Heidelberg (1996)

    Google Scholar 

  2. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute (1995)

    Google Scholar 

  3. Craver, S.: On Public-Key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships WithIn visible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection (April 1998); (IBM Research Report, RC 20755, March 1997)

    Google Scholar 

  5. Craver, S., Yeo, B.L., Yeung, M.M.: Technical Trials and Legal Tribulations. Communications of the ACM, 44–54 (July 1998)

    Google Scholar 

  6. Hartung, F.H., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE, San Jose, CA, February 1999, pp. 147–158 (1999)

    Google Scholar 

  7. Linnartz, J.M.G., van Dijk, M.: Analysis of the Sensitivity Attack against Electronic Watermaks in Images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Maes, M.: Twin Peaks: The Histogram Attack on Fixed Depth Image Watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Pitas, I.: A Method for Signature Casting on Digital Images. In: Proceedings of ICIP, vol. 3, pp. 215–218. IEEE press, Los Alamitos (1996)

    Google Scholar 

  10. Salomaa, A.: Public-Key Cryptography, 2nd edn. Springer, Berlin (1996)

    MATH  Google Scholar 

  11. Schneier, B.: Applied Cryptograpy: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)

    MATH  Google Scholar 

  12. Vandegriend, B., Culberson, J.: The Gn,m Phase Transition is Not Hard for the Hamiltonian Cycle Problem. Journal of Artificial Intelligence Research, 9, 219–245 (1998)

    Google Scholar 

  13. Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proceedings of IS&T PIC Conference, Portland, OR (May 1998)

    Google Scholar 

  14. Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proceedings of ICIP, Santa Barbara, CA. IEEE press, Los Alamitos (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Craver, S. (2000). Zero Knowledge Watermark Detection. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_8

Download citation

  • DOI: https://doi.org/10.1007/10719724_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics