Skip to main content

On the Integration of Watermarks and Cryptography

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2939))

Abstract

Applications that involve watermarking schemes are typically composed of both watermarks and cryptographic primitives. The entire application is required to meet specific application-dependant security properties, which critically depend on both the properties of the watermarking scheme and the security of cryptographic primitives. Although the design of secure cryptographic protocols is more or less well-understood, the combination of watermarks and cryptographic primitives poses new problems. This paper reviews some of the fallacies and pitfalls that occur during the design of secure watermarking applications, and provides some practical guidelines for secure watermarking protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: On the insecurity of noninvertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Watermark detection with zero-knowledge disclosure. ACM Multimedia Systems Journal (2003) (to appear)

    Google Scholar 

  3. Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Digital Rights Management, DRM 2003 (2003)

    Google Scholar 

  4. Adelsbach, A., Pfitzmann, B., Sadeghi, A.: Proving ownership of digital content. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 117–133. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Adelsbach, A., Sadeghi, A.-R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Adelsbach, A., Sadeghi, A.-R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of the SPIE vol. 5020, Security and Watermarking of Multimedia Contents V, pp. 677–688 (2003) (to appear)

    Google Scholar 

  7. Anderson, R.: Security Engineering. Wiley, Chichester (2001)

    Google Scholar 

  8. Cox, I., Linnartz, J.-P.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16(4), 587–593 (1998)

    Article  Google Scholar 

  9. Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Craver, S., Katzenbeisser, S.: Copyright protection protocols based on asymmetric watermarking. In: Communications and Multimedia Security Issues of the New Century, pp. 159–170. Kluwer, Dordrecht (2001)

    Google Scholar 

  11. Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  12. Duhamel, P., Furon, T.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 89–100. Springer, Heidelberg (2000)

    Google Scholar 

  13. Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Netzen und Medienströmen, pp. 124–133. Springer, Heidelberg (2000)

    Google Scholar 

  14. Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference (2000)

    Google Scholar 

  15. Memon, N., Wong, P.W.: Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In: Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 189–294 (1999)

    Google Scholar 

  16. Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Google Scholar 

  17. Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer’s rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)

    Article  Google Scholar 

  18. van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol. 1, pp. 580–585 (1999)

    Google Scholar 

  19. Zeng, W., Liu, B.: On resolving ownerships of digital images by invisible watermarks. In: IEEE Int. Conf. on Image Processing, vol. I, pp. 552–555 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Katzenbeisser, S. (2004). On the Integration of Watermarks and Cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24624-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21061-0

  • Online ISBN: 978-3-540-24624-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics