Abstract
In order for digital watermarking technology to be truly usable, one must be able to employ it without annihilating its effect. The act of revealing a watermark within an object, in order to prove ownership or detect theft of said object, may open the door to subsequent theft, by providing attackers with the information they need to remove the watermark. The idea of zero-knowledge watermarking, of proving the existence of a mark without revealing what that mark is, can help address this problem and others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, R.J.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39–48. Springer, Heidelberg (1996)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute (1995)
Craver, S.: On Public-Key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)
Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving Rightful Ownerships WithIn visible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection (April 1998); (IBM Research Report, RC 20755, March 1997)
Craver, S., Yeo, B.L., Yeung, M.M.: Technical Trials and Legal Tribulations. Communications of the ACM, 44–54 (July 1998)
Hartung, F.H., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE, San Jose, CA, February 1999, pp. 147–158 (1999)
Linnartz, J.M.G., van Dijk, M.: Analysis of the Sensitivity Attack against Electronic Watermaks in Images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Maes, M.: Twin Peaks: The Histogram Attack on Fixed Depth Image Watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)
Pitas, I.: A Method for Signature Casting on Digital Images. In: Proceedings of ICIP, vol. 3, pp. 215–218. IEEE press, Los Alamitos (1996)
Salomaa, A.: Public-Key Cryptography, 2nd edn. Springer, Berlin (1996)
Schneier, B.: Applied Cryptograpy: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)
Vandegriend, B., Culberson, J.: The Gn,m Phase Transition is Not Hard for the Hamiltonian Cycle Problem. Journal of Artificial Intelligence Research, 9, 219–245 (1998)
Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proceedings of IS&T PIC Conference, Portland, OR (May 1998)
Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proceedings of ICIP, Santa Barbara, CA. IEEE press, Los Alamitos (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Craver, S. (2000). Zero Knowledge Watermark Detection. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_8
Download citation
DOI: https://doi.org/10.1007/10719724_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive