Abstract
We present a semi-public key implementation of quantization index modulation (QIM) watermarking called Secure QIM (SQIM). Given a signal, a watermark detector can learn the presence of an SQIM watermark without learning anything anything else from the detection process. The watermark detector first transforms the signal with a secret transform, unknown to the detector, and then quantizes the transform coefficients with secret quantizers, also unknown to the detector. This is done with the use of homomorphic cryptosystems, where calculations are performed in an encrypted domain. A low-power, trusted, secure module is used at the end of the process and reveals only if the signal was watermarked or not. Even after repeated watermark detections, no more information is revealed than the watermarked status of the signals. The methods we present are for watermark systems with quantizers of stepsize 2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adelsbach, A., Sadeghi, A.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding Workshop (2000)
Brumley, D., Boneh, D.: Remote timing attacks are practical. In: 12th USENIX Security Symposium (2003)
Catalano, D., Gennaro, R., Howgrave-Graham, N., Nguyen, P.Q.: Paillier’s cryptosystem revisited. In: CCS 2001. Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 206–214. ACM Press, New York, NY, USA (2001)
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)
Cox, I.J., Linnartz, J.-P.M.G.: Public watermarks and resistance to tampering. In: International Conference on Image Processing (ICIP 97), pp. 26–29 (1997)
Eggers, J., Su, J., Girod, B.: Asymmetric watermarking schemes (2000)
Hachez, G., Quisquater, J.-J.: Which directions for asymmetric watermarking. In: XI European Signal Processing Conference (2002)
Kalker, T.: Secure watermark detection. In: Allerton Conference (2005)
Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Heidelberg (1994)
Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Crypto (1996)
Malkin, M.: Cryptographic Methods in Multimedia Identification and Authentication. PhD thesis, Stanford University (2006), http://theory.stanford.edu/~mikeym/papers/malkin-thesis.pdf
Jaffe, J., Kocher, P., Jun, B.: Differential power analysis: Leaking secrets. In: Crypto, Springer, Heidelberg (1999)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt ’99, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Chang, E.C., Li, Q.: Security of public watermarking schemes for binary sequences. In: Information Hiding Workshop (2002)
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Proc. of Public Key Cryptography (2001)
Micali, S., Goldwasser, s.: Probabilistic encryption. Journal of Computer and Systems Science 28, 270–299 (1984)
Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Venturini, I.: Counteracting oracle attacks. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 187–192. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Malkin, M., Kalker, T. (2007). A Cryptographic Method for Secure Watermark Detection. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-74124-4_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74123-7
Online ISBN: 978-3-540-74124-4
eBook Packages: Computer ScienceComputer Science (R0)