Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data

  • André Adelsbach
  • Markus Rohe
  • Ahmad-Reza Sadeghi
Conference paper

DOI: 10.1007/11926214_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4300)
Cite this paper as:
Adelsbach A., Rohe M., Sadeghi AR. (2006) Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. In: Shi Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg

Abstract

Robust digital watermarking systems are important building blocks in applications such as fingerprinting, dispute resolving or direct proofs of authorship, where the presence of a watermark serves as evidence for some fact, e.g., illegal redistribution or authorship. A major drawback of (symmetric) watermarking schemes in this context is that proving the presence of a watermark requires disclosing security critical detection information (watermark, detection key, original data) to a (potentially malicious) verifying party. This may completely jeopardise the security of embedded watermarks once this information is revealed. To overcome this problem recent work on secure watermark detection proposes cryptographic proofs that perform the detection on concealed detection information. The proposed solutions focus on correlation-based detection and can be applied to any watermarking scheme whose detection criteria can be expressed as a polynomial relation between the quantities required for the detection.

In this paper, we present in-depth guidelines for the adoptions required to transform well-established watermarking schemes by Cox et al and Piva et al into secure cryptographic proofs in the non-interactive setting. Moreover, we present our implementation, its performance results and the corresponding tool we have developed for this purpose. Our results underpin the practicability of the cryptographic approach.

Keywords

watermark detection implementation zero-knowledge 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • André Adelsbach
    • 1
  • Markus Rohe
    • 2
  • Ahmad-Reza Sadeghi
    • 2
  1. 1.Chair for Network and Data SecurityRuhr-Universität BochumGermany
  2. 2.Applied Data Security GroupRuhr-Universität BochumGermany

Personalised recommendations