An Efficient Dispute Resolving Method for Digital Images

  • Yunho Lee
  • Heasuk Jo
  • Seungjoo Kim
  • Dongho Won
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4277)


Resolving rightful ownerships of digital images is an active research area of watermarking. Though a watermark is used to prove the owner’s ownership, an attacker can invalidate it by creating his fake original image and its corresponding watermark. This kind of attack is called ambiguity attack and can be tackled either by use of non-invertible watermarking schemes or by use of zero-knowledge watermark detections. If a non-invertible watermarking scheme is used, then the owner should reveal her original image which should be kept secret. And if a zero-knowledge watermark detection is used, then no one can verify the claimed ownership unless the owner is involved. Moreover, in case of zero-knowledge watermark detection, the protocol is relatively complicated and needs more computations. In this paper, using the MSBs string of the original image other than the original image itself, we propose an efficient dispute resolving method while preserving secrecy of the original image.


Ownership Non-invertible Watermark Similarity Functions 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownership? IBM Research Division, Tech. Rep., RC20509 (1996)Google Scholar
  2. 2.
    Zeng, W., Liu, B.: On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks. In: Proc. of the 4th International Conference on Image Processing (ICIP), pp. 552–555 (1997)Google Scholar
  3. 3.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6, 1673–1687 (1997)CrossRefGoogle Scholar
  4. 4.
    Craver, S., Memon, N., Yeo, B., Yeung, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE J. on Selected Areas of Communications 16(4), 573–586 (1998)CrossRefGoogle Scholar
  5. 5.
    Qiao, L.T., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)CrossRefGoogle Scholar
  6. 6.
    Ramkumar, M., Akansu, A.N.: Image Watermarks and Counterfeit Attacks: Some Problems and Solutions. In: Proc. of Content Security and Data Hiding in Digital Media (May 1999)Google Scholar
  7. 7.
    Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. 8.
    Adelsbach, A., Sadeghi, A.R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks. In: Proc. of the 2003 ACM Workshop on DRM, pp. 111–119 (2003)Google Scholar
  10. 10.
    Adelsbach, A., Sadeghi, A.R.: Advanced Techniques for Dispute Resolving and Authorship Proofs on Digital Works. In: Proc. of SPIE Security and Watermarking of Multimedia Contents, vol. 5020 (2003)Google Scholar
  11. 11.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark Detection with Zero-Knowledge Disclosure. ACM Multimedia Systems Journal, Special Issue on Multimedia Security 9(3), 266–278 (2003)Google Scholar
  13. 13.
    Li, Q., Chang, E.C.: On the Possibility of Non-Invertible Watermarking Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 13–24. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Lee, Y., Lee, K., Kim, S., Won, D., Yang, H.: A Method for Deciding Quantization Steps in QIM Watermarking Schemes. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 965–975. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yunho Lee
    • 1
  • Heasuk Jo
    • 1
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Information Security GroupSungkyunkwan UniversityKorea

Personalised recommendations