Skip to main content

An Efficient Dispute Resolving Method for Digital Images

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

Resolving rightful ownerships of digital images is an active research area of watermarking. Though a watermark is used to prove the owner’s ownership, an attacker can invalidate it by creating his fake original image and its corresponding watermark. This kind of attack is called ambiguity attack and can be tackled either by use of non-invertible watermarking schemes or by use of zero-knowledge watermark detections. If a non-invertible watermarking scheme is used, then the owner should reveal her original image which should be kept secret. And if a zero-knowledge watermark detection is used, then no one can verify the claimed ownership unless the owner is involved. Moreover, in case of zero-knowledge watermark detection, the protocol is relatively complicated and needs more computations. In this paper, using the MSBs string of the original image other than the original image itself, we propose an efficient dispute resolving method while preserving secrecy of the original image.

This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownership? IBM Research Division, Tech. Rep., RC20509 (1996)

    Google Scholar 

  2. Zeng, W., Liu, B.: On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks. In: Proc. of the 4th International Conference on Image Processing (ICIP), pp. 552–555 (1997)

    Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  4. Craver, S., Memon, N., Yeo, B., Yeung, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE J. on Selected Areas of Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  5. Qiao, L.T., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)

    Article  Google Scholar 

  6. Ramkumar, M., Akansu, A.N.: Image Watermarks and Counterfeit Attacks: Some Problems and Solutions. In: Proc. of Content Security and Data Hiding in Digital Media (May 1999)

    Google Scholar 

  7. Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Adelsbach, A., Sadeghi, A.R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks. In: Proc. of the 2003 ACM Workshop on DRM, pp. 111–119 (2003)

    Google Scholar 

  10. Adelsbach, A., Sadeghi, A.R.: Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works. In: Proc. of SPIE Security and Watermarking of Multimedia Contents, vol. 5020 (2003)

    Google Scholar 

  11. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark Detection with Zero-Knowledge Disclosure. ACM Multimedia Systems Journal, Special Issue on Multimedia Security 9(3), 266–278 (2003)

    Google Scholar 

  13. Li, Q., Chang, E.C.: On the Possibility of Non-Invertible Watermarking Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 13–24. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Lee, Y., Lee, K., Kim, S., Won, D., Yang, H.: A Method for Deciding Quantization Steps in QIM Watermarking Schemes. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 965–975. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Y., Jo, H., Kim, S., Won, D. (2006). An Efficient Dispute Resolving Method for Digital Images. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_57

Download citation

  • DOI: https://doi.org/10.1007/11915034_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics