Zero-Knowledge Watermark Detection and Proof of Ownership

  • André Adelsbach
  • Ahmad-Reza Sadeghi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2137)

Abstract

The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven) and coverage (handle only blind watermark detection). In this paper we define zero-knowledge watermark detection precisely.

We then propose efficient and provably secure zero-knowledge protocols for blind and non-blind versions of a well-known class of watermarking schemes. Using these protocols the security and efficiency of many watermark based applications can be significantly improved.

As an example of use we propose concrete protocols for direct proof of ownership which enable offline ownership proofs, i.e., copyright holders can prove their rightful ownership to anyone without involving a trusted third party in the actual proof protocol.

Keywords

Zero-Knowledge Watermark Detection Ownership Proofs 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 117–133Google Scholar
  2. 2.
    Mihir Bellare, Oded Goldreich: On Defining Proofs of Knowledge; Crypto’ 92, LNCS 740, Springer-Verlag, Berlin 1993, pp. 390–420Google Scholar
  3. 3.
    Mihir Bellare, Phillip Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols; 1st ACM Conference on Computer and Communications Security, ACM Press, New York, 1993, pp. 62–73CrossRefGoogle Scholar
  4. 4.
    Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, pp. 452–465Google Scholar
  5. 5.
    Fabrice Boudot: Efficient Proofs that a Committed Number Lies in an Interval; Eurocrypt’ 00, LNCS 1807, Springer-Verlag, Berlin 2000, pp. 431–444Google Scholar
  6. 6.
    Jan Camenisch, Markus Michels: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes; Eurocrypt’ 99, LNCS 1592, Springer-Verlag, Berlin, 1999, pp. 107–122Google Scholar
  7. 7.
    Scott Craver: Zero Knowledge Watermark Detection; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 101–116Google Scholar
  8. 8.
    Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon: A Secure, Robust Watermark for Multimedia; Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 185–206Google Scholar
  9. 9.
    Scott Craver, Nasir Memon, Boon-Lock Yeo, Minerva M. Yeung: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications; IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, Mai 1998, pp. 573–586CrossRefGoogle Scholar
  10. 10.
    Ingemar J. Cox, Jean-Paul M. G. Linnartz: Some General Methods for Tampering with Watermarks, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May 1998, pp. 587–593CrossRefGoogle Scholar
  11. 11.
    J. J. Eggers, J. K. Su, B. Girod: Asymmetric Watermarking Schemes; Sicherheit in Mediendaten, Berlin, Germany, Springer Reihe: Informatik Aktuell, September 2000Google Scholar
  12. 12.
    J. J. Eggers, J. K. Su, B. Girod: Public Key Watermarking By Eigenvectors of Linear Transforms; European Signal Processing Conference, Tampere, Finland, September 2000Google Scholar
  13. 13.
    Amos Fiat, Adi Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature Problems; Crypto’ 86, LNCS 263, Springer-Verlag, Berlin 1987, pp. 186–194Google Scholar
  14. 14.
    Teddy Furon, Pierre Duhamel: An Asymmetric Public Detection Watermarking Technique; Information Hiding: Third International Workshop, LNCS 1768, Springer-Verlag, Berlin, 2000, pp. 88–100Google Scholar
  15. 15.
    Eiichiro Fujisaki, Tatsuaki Okamoto: A practical and provably secure scheme for publicly verifiable secret sharing and its applications; Eurocrypt’ 98, LNCS 1403, Springer-Verlag, Berlin 1998, pp. 32–46CrossRefGoogle Scholar
  16. 16.
    Shafi Goldwasser, Silvio Micali, Charles Rackoff: The Knowledge Complexity of Interactive Proof Systems; SIAM Journal on Computing 18/1 (1989), pp. 186–207.CrossRefMathSciNetGoogle Scholar
  17. 17.
    Oded Goldreich, Jair Oren: Definitions and Properties of Zero-Knowledge Proof Systems; Journal of Cryptology, 1994, 7(1), pp. 1–32MATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    K. Gopalakrishnan, Nasi Memon, Poorvi Vora: Protocols for Watermark Verification; Multimedia and Security, Workshop at ACM Multimedia 1999, pp. 91–94Google Scholar
  19. 19.
    Frank Hartung, Martin Kutter: Multimedia Watermarking Techniques; Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1079–1107CrossRefGoogle Scholar
  20. 20.
    Alexander Herrigel, Joseph Ó Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun: Secure Copyright Protection Techniques for Digital Images; Information Hiding, LNCS 1525, Springer-Verlag, Berlin, 1998, pp. 169–190CrossRefGoogle Scholar
  21. 21.
    Jean-Paul M. G. Linnartz, Marten van Dijk: Analysis of the Sensitivity Attack against Electronic Watermarks in Images; Information Hiding: Second International Workshop; LNCS 1525, Springer-Verlag, Berlin 1998, pp. 258–272Google Scholar
  22. 22.
    Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract); Eurocrypt’ 96, LNCS 1070, Springer-Verlag, Berlin 1996, pp. 84–95Google Scholar
  23. 23.
    Lintian Qiao, Klara Nahrstedt: Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership; International Conference on Multimedia Computing and Systems, Austin, Texas, USA, 1998, pp. 276–285Google Scholar
  24. 24.
    Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik: Multimedia DataEmbedding and Watermarking Technologies; Proceedings of the IEEE, Vol. 86, No. 6, June 1998, pp. 1064–1087CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • André Adelsbach
    • 1
  • Ahmad-Reza Sadeghi
    • 1
  1. 1.FR 6.2 InformatikUniversität des SaarlandesSaarbrückenGermany

Personalised recommendations