Skip to main content

Secure Watermark Verification Scheme

  • Conference paper
  • First Online:
Advances in Multimedia Information Processing — PCM 2002 (PCM 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2532))

Included in the following conference series:

Abstract

Digital watermark is an active research area that has received a considerable attention in multimedia applications. Copyright protection of digital contents, as one of the most important application of digital watermark, works by watermark verification. In traditional watermark authentication scheme, a prover exposed a watermark to be present in a digital data to the verifier. However, an attacker is able to spoil or remove the watermark entirely once classified information is known. Some of previous schemes proposed as solution haven’t achieved desirable result really. In this paper, we propose a secure watermark verification scheme based on commitment scheme and zero knowledge protocols in order to solve this problem. There will be no secret information that can be used for removing watermark is disclosed during the verification process. It has considerable advantages over previously proposed schemes in terms of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Kinoshita.: An Image Digital Signature System with ZKIP for the Graph Isomorphism Problem. Proc. IEEE Conf. Image Processing (ICIP96), vol.3. IEEE Press, Piscataway, N.J., (1996) 247–250.

    Article  Google Scholar 

  2. K. Gopalakrishnan, N. Memon, P. Vora.: Protocols for Watermark Verification. Multimedia and Security, Workshop at ACM Multimedia. (1999) 91–94.

    Google Scholar 

  3. A. Adelsbach, A. R. Sadeghi, “Zero Knowledge Watermark Detection and Proof of Ownership,” Information Hiding: Fourth International Workshop, LNCS 2137, Springer Verlag. (2001) 273–287.

    MATH  Google Scholar 

  4. I. Cox, J. Kilian, T. Leighton, T. Shamoon.:Secure spread spectrum watermarking for multimedia.. IEEE Transactions on Image Processing, vol. 6. (1997) 1673–1687.

    Article  Google Scholar 

  5. S. Craver.:Zero Knowledge Watermark Detection. Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, (2000) 101–116.

    Google Scholar 

  6. S. Craver, S. Katzenbeisser, “Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept,” to appear in Communications and Multimedia Security 2001.

    Google Scholar 

  7. D. R. Stinson.:Cryptography-Theory and practice. CRC Press, Boca Raton, Fla (1995)

    Google Scholar 

  8. B. Schneier.: Applied Cryptography: protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley and Sons (1996)

    MATH  Google Scholar 

  9. E. Fujisaki, T. Okamoto.:A practical and provably secure scheme for publicly verifiable secret sharing and its applications. Eurocrypt’98, LNCS 1403, Springer-Verlag, (1998) 88–100.

    Google Scholar 

  10. J. Camenisch, M. Michels,.:Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. Eurocrypt’99, LNCS 1592, Springer-Verlag, (2000) 101–116.

    Google Scholar 

  11. I. Damgard, E. Fujisaki.:An Integer Commitment Scheme based on Groups with Hiding Order. Preliminary Version.

    Google Scholar 

  12. F. Boudot.:Efficient Proofs that a Committed Number Lies in an Interval. Eurocrypt’00, LNCS 1807, Springer-Verlag (2000) 431–444.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yongliang, L., Gao, W., Yao, H., Song, Y. (2002). Secure Watermark Verification Scheme. In: Chen, YC., Chang, LW., Hsu, CT. (eds) Advances in Multimedia Information Processing — PCM 2002. PCM 2002. Lecture Notes in Computer Science, vol 2532. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36228-2_59

Download citation

  • DOI: https://doi.org/10.1007/3-540-36228-2_59

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00262-8

  • Online ISBN: 978-3-540-36228-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics