Advertisement

Watermarking Security: A Survey

  • Luis Pérez-Freire
  • Pedro Comesaña
  • Juan Ramón Troncoso-Pastoriza
  • Fernando Pérez-González
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4300)

Abstract

Watermarking security has emerged in the last years as as a new subject in the watermarking area. As it brings new challenges to the design of watermarking systems, a good understanding of the problem is fundamental. This paper is intended to clarify the concepts related to watermarking security, provide an exhaustive literature overview, and serve as a starting point for newcomers interested in carrying out research on this topic.

Keywords

Mutual Information Watermark Image Watermark Scheme Host Image Digital Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bartolini, F., Barni, M., Furon, T.: Security issues in digital watermarking. In: Proc. of 11th European Signal Processing Conference (EUSIPCO), Toulouse, France, vol. 1, pp. 282–302, 441–461 (2002)Google Scholar
  2. 2.
    Barni, M., Pérez-González, F.: Special session: watermarking security. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, vol. 5681, pp. 685–768. SPIE (2005)Google Scholar
  3. 3.
    Barni, M., Pérez-González, F.: Tutorial: Security issues in digital watermarking. In: IEEE International Conference on Image Processing (ICIP), Genova, Italy (2005)Google Scholar
  4. 4.
    Pérez-González, F., Furon, T.: Special session on watermarking security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–274. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    CERTIMARK: Certification of Watermarking Techniques (2000-2002), http://www.certimark.org
  6. 6.
    ECRYPT: European Network of Excellence in Cryptology (2004-2008), http://www.ecrypt.eu.org
  7. 7.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Multimedia Information and Systems. Morgan Kauffman, San Francisco (2002)Google Scholar
  8. 8.
    Barni, M., Bartolini, F.: Watermarking Systems Engineering. In: Signal Processing and Communications. Marcel Dekker, New York (2004)Google Scholar
  9. 9.
    Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87, 1062–1078 (1999)CrossRefGoogle Scholar
  11. 11.
    van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proc. IEEE Int. Conference on Image Processing, Austin, Texas, USA, pp. 86–89 (1994)Google Scholar
  12. 12.
    Viterbi, A.: CDMA: principles of spread spectrum communication. Addison Wesley Longman Publishing Co., Inc, Redwood City (1995)MATHGoogle Scholar
  13. 13.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)CrossRefGoogle Scholar
  14. 14.
    Hernández, J.R., Pérez-González, F., Rodríguez, J.M., Nieto, G.: Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16, 510–524 (1998)CrossRefGoogle Scholar
  15. 15.
    Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: Proc. IEEE ICIP 1997, Santa Barbara, California, USA, vol. 1, pp. 528–531 (1997)Google Scholar
  16. 16.
    Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. In: Proc. of the SPIE, San Jose, CA, pp. 2420–2440 (1995)Google Scholar
  17. 17.
    Koch, E., Rindfrey, J., Zhao, J.: Copyright protection for multimedia data. In: Digital Media and Electronc Publishing, pp. 203–213. Academic Press, London (1996)Google Scholar
  18. 18.
    Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proc. International Conference on Imaging Science, Systems, and Technology, Las Vegas, NV, USA, pp. 237–243 (1999)Google Scholar
  19. 19.
    Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Elsevier Signal Processing 83, 2095–2116 (2003)MATHGoogle Scholar
  20. 20.
    Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., Etri, T.: A secure watermarking for JPEG 2000. In: Proc. IEEE Int. Conf. Image Processing, Thessaloniki, Greece, vol. 2, pp. 530–533 (2001)Google Scholar
  21. 21.
    Wang, Y., Doherty, J., Dyck, R.V.: A wavelet-based watermarking algorithm for ownership verificationof digital images. IEEE Trans. on Image Processing 11, 77–88 (2002)CrossRefGoogle Scholar
  22. 22.
    Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)Google Scholar
  23. 23.
    Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. Multimedia, IEEE Transactions 4, 551–560 (2002)CrossRefGoogle Scholar
  24. 24.
    Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digital image domain. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, USA, vol. 2, pp. 432–436 (1998)Google Scholar
  25. 25.
    Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int. Conf. Image Processing, Laussane, Switzerland, vol. 2, pp. 237–240. Laussane, Switzerland (1996)CrossRefGoogle Scholar
  26. 26.
    Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51, 898–905 (2003)CrossRefMathSciNetGoogle Scholar
  27. 27.
    Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)MATHCrossRefMathSciNetGoogle Scholar
  28. 28.
    Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51, 1003–1019 (2003) (Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery)CrossRefMathSciNetGoogle Scholar
  29. 29.
    Fei, C., Kundur, D., Kwong, R.H.: Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 1, 43–55 (2006)CrossRefGoogle Scholar
  30. 30.
    Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing 53, 3960–3975 (2005) (Third supplement on secure media)CrossRefGoogle Scholar
  31. 31.
    Moulin, P., Goteti, A.K.: Minmax strategies for QIM watermarking subject to attacks with memory. In: IEEE International Conference on Image Processing, ICIP 2005, Genova, Italy, vol. 1, pp. 985–988 (2005)Google Scholar
  32. 32.
    Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP 2002, Rochester, NY, USA, vol. 3, pp. 153–156 (2002)Google Scholar
  33. 33.
    Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermarking. IEEE Transactions on Image Processing 13, 792–807 (2004)CrossRefGoogle Scholar
  34. 34.
    Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  35. 35.
    Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  36. 36.
    Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)CrossRefGoogle Scholar
  37. 37.
    Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan, R.E.: Resistance of watermarked documents to collusional attacks. Technical report, NEC Research Institute, Princeton, NJ (1997)Google Scholar
  38. 38.
    Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)Google Scholar
  39. 39.
    Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  40. 40.
    Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  41. 41.
    Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, Springer, Heidelberg (1998)CrossRefGoogle Scholar
  42. 42.
    Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)MATHMathSciNetGoogle Scholar
  43. 43.
    Kalker, T.: Considerations on watermarking security. In: IEEE International Workshop on Multimedia Signal Processing, Cannes, France, pp. 201–206 (2001)Google Scholar
  44. 44.
    Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)Google Scholar
  45. 45.
    Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)Google Scholar
  46. 46.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–684 (1976)MATHCrossRefMathSciNetGoogle Scholar
  47. 47.
    Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003) (Special issue on Security of Data Hiding Technologies, invited paper)MATHCrossRefGoogle Scholar
  48. 48.
    Barni, M., Bartolini, F., Rosa, A.D.: Advantages and drawbacks of multiplicative spread spectrum watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents V. Proceedings of SPIE, pp. 290–299 (2003)Google Scholar
  49. 49.
    Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)CrossRefMathSciNetGoogle Scholar
  50. 50.
    Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222, 309–368 (1922)CrossRefGoogle Scholar
  51. 51.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. In: 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland (2005)Google Scholar
  52. 52.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  53. 53.
    Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  54. 54.
    Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.: Security of lattice-based data hiding against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Accepted for publication (2006)Google Scholar
  55. 55.
    Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)Google Scholar
  56. 56.
    Hernández, J.R., Pérez-González, F.: Shedding More Light on Image Watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 191–207. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  57. 57.
    Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans 52, 2955–2964 (2004)CrossRefGoogle Scholar
  58. 58.
    Katzenbeisser, S.: Computational security models for digital watermarks. In: Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland (2005)Google Scholar
  59. 59.
    Cramér, H.: Mathematical methods of statistics. Landmarks on Mathematics. Princeton University Press, Princeton (reprint, 1999)Google Scholar
  60. 60.
    Guo, D., Shamai, S., Verdú, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Transactions on Information Theory 51, 1261–1282 (2005)CrossRefGoogle Scholar
  61. 61.
    Guo, D., Shamai, S., Verdú, S.: Additive non-Gaussian noise channels: Mutual information and conditional mean estimation. In: IEEE International Symposium on Information Theory (ISIT), Adelaide, Australia, pp. 719–723 (2005)Google Scholar
  62. 62.
    Palomar, D.P., Verdú, S.: Gradient of mutual information in linear vector Gaussian channels. IEEE Transactions on Information Theory 52, 141–154 (2006)CrossRefGoogle Scholar
  63. 63.
    Bas, P., Cayre, F.: Natural Watermarking: A Secure Spread Spectrum Technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1–14. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  64. 64.
    Hyvärinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. In: Adaptive and learning systems for signal processing, communications and control, John Wiley & Sons, Chichester (2001)Google Scholar
  65. 65.
    Moulin, P., Koetter, R.: Data hiding codes. Proceedings of IEEE 93, 2083–2126 (2005)CrossRefGoogle Scholar
  66. 66.
    Pérez-Freire, L., Pérez-González, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, California, USA, SPIE (2006)Google Scholar
  67. 67.
    Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups, 3rd edn. Comprehensive Studies in Mathematics, vol. 290. Springer, Heidelberg (1999)MATHGoogle Scholar
  68. 68.
    Costa, M.H.: Writing on dirty paper. IEEE Trans. on Information Theory 29, 439–441 (1983)MATHCrossRefGoogle Scholar
  69. 69.
    Burgett, S., Koch, E., Zhao, J.: Copyright labeling of digitized image data. IEEE Communications Magazine 36, 94–100 (1998)CrossRefGoogle Scholar
  70. 70.
    Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4, 551–560 (2002)CrossRefGoogle Scholar
  71. 71.
    Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Petitcolas, F.A.P. (ed.) 5th International Workshop on Digital Watermarking, Noordwijkerhout, The Netherlands, pp. 226–246. Springer, Heidelberg (2002)Google Scholar
  72. 72.
    Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modeling: Towards a second generation benchmark. Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking 81, 1177–1214 (2001)MATHGoogle Scholar
  73. 73.
    Hyvärinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks 13, 411–430 (2000)CrossRefGoogle Scholar
  74. 74.
    Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, Springer, Heidelberg (2005)CrossRefGoogle Scholar
  75. 75.
    Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B (Methodological) 39, 1–38 (1977)MATHMathSciNetGoogle Scholar
  76. 76.
    Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Canada, vol. 3, pp. 93–96 (2004)Google Scholar
  77. 77.
    Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, Springer, Heidelberg (2003)Google Scholar
  78. 78.
    Combettes, P.L.: The foundations of set theoretic estimation. Proceedings of the IEEE 81, 182–208 (1993)CrossRefGoogle Scholar
  79. 79.
    Deller, J.R.: Set membership identification in digital signal processing. IEEE ASSP Magazine 6, 4–20 (1989)CrossRefGoogle Scholar
  80. 80.
    Cheung, M.F., Yurkovich, S., Passino, K.M.: An optimal volume ellipsoid algorithm for parameter set estimation. IEEE Transactions on Automatic Control 38, 1292–1296 (1993)MATHCrossRefMathSciNetGoogle Scholar
  81. 81.
    Bas, P., Hurri, J.: Security of DM quantization watermarking schemes: a practical study for digital images. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 186–200. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  82. 82.
    Fridrich, J., Goljan, M., Soukal, D.: Searching for the stego-key. In: Proc. of Security and Watermarking of Multimedia Contents VI, San Jose, CA, USA. Proceedings of SPIE, pp. 70–82 (2004)Google Scholar
  83. 83.
    Westfeld, A.: High capacity despite better steganalysis (F5-A steganographic algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  84. 84.
    Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA, pp. 323–336 (2001)Google Scholar
  85. 85.
    Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proc. of Security and Watermarking of Multimedia Contents VII, San Jose, CA, USA. Proceedings of SPIE (2005)Google Scholar
  86. 86.
    Fridrich, J., Goljan, M., Soukal, D., Memon, N.: Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proc. of Security and Watermarking of Multimedia Contents II, San Jose, CA, USA. Proceedings of SPIE, pp. 428–437 (2000)Google Scholar
  87. 87.
    Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  88. 88.
    Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP 1998, Chicago, IL, USA, pp. 425–429 (1998)Google Scholar
  89. 89.
    El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia contents VII, January 2005, pp. 734–745 (2005)Google Scholar
  90. 90.
    Mansour, M.F., Tewfik, A.H.: LMS-based attack on watermark public detectors. In: IEEE International Conference on Image Processing, ICIP 2002, vol. 3, pp. 649–652 (2002)Google Scholar
  91. 91.
    Venturini, I.: Oracle attacks and covert channels. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 171–185. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  92. 92.
    Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII. SPIE, vol. 6072 (2006)Google Scholar
  93. 93.
    Venkatesan, R., Jakubowski, M.H.: Randomized detection for spread-spectrum watermarking: defending against sensitivity and other attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Philadelphia, USA, vol. 2, pp. 9–12 (2005)Google Scholar
  94. 94.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The return of the sensitivity attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  95. 95.
    Holliman, M., Memon, N., Yeung, M.: On the need for image dependent keys for watermarking. In: Proceedings of IEEE Content Security and Data Hiding in Digital Media, Newark, NJ, USA (1999)Google Scholar
  96. 96.
    Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, pp. 173–178 (2000)Google Scholar
  97. 97.
    Smith, J.R., Dodge, C.: Developments in steganography. In: Information Hiding, pp. 77–87 (1999)Google Scholar
  98. 98.
    Miller, M.L.: Is asymmetric watermarking necessary or sufficient? In: Proc. XI European Signal Processing Conference, EUSIPCO 2002, pp. 291–294 (2002)Google Scholar
  99. 99.
    Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)MATHCrossRefGoogle Scholar
  100. 100.
    Choi, H., Lee, K., Kim, T.: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 11, 251–254 (2004)CrossRefGoogle Scholar
  101. 101.
    Kim, T.Y., Choi, H., Lee, K., Kim, T.: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Letters 11, 375–377 (2004)CrossRefGoogle Scholar
  102. 102.
    van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: IEEE International Conference on Multimedia Computing Systems (ICMCS 1999), Florence, pp. 580–585 (1999)Google Scholar
  103. 103.
    Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, Tampere, Finland (2000)Google Scholar
  104. 104.
    Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Mediendaten, Springer Reihe, Informatik Aktuell (Invited paper, 2000)Google Scholar
  105. 105.
    Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) Proc. of the third Int. Workshop on Information Hiding, Dresden, Germany, pp. 88–100. Springer, Heidelberg (1999)Google Scholar
  106. 106.
    Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003): Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.CrossRefMathSciNetGoogle Scholar
  107. 107.
    Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Wong, P.W., Delp III, E.J. (eds.) Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)Google Scholar
  108. 108.
    Furon, T.: Use of watermarking techniques for copy protection. PhD thesis, Ecole Nationale Supérieure des Télécommunications (2002)Google Scholar
  109. 109.
    Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, San José, CA, USA. Proc. of SPIE, vol. 4675, pp. 102–109 (2002)Google Scholar
  110. 110.
    Mansour, M.F., Tewfik, A.H.: Secure detection of public watermarks with fractal decision boundary. In: Proc. XI European Signal Processing Conference, Toulouse, France (2002)Google Scholar
  111. 111.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pp. 291–304 (1985)Google Scholar
  112. 112.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal of Computing 18, 186–208 (1989)MATHCrossRefMathSciNetGoogle Scholar
  113. 113.
    Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37, 156–189 (1988)MATHCrossRefMathSciNetGoogle Scholar
  114. 114.
    Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)Google Scholar
  115. 115.
    Goldreich, O., Petrank, E.: Quantifying knowledge complexity. Computational Complexity 8, 50–98 (1999)MATHCrossRefMathSciNetGoogle Scholar
  116. 116.
    Gopalakrishnan, K., Memon, N.D., Vora, P.: Protocols for watermark verification. In: Multimedia and Security Workshop at ACM Multimedia, pp. 91–94 (1999)Google Scholar
  117. 117.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–176 (1978)MATHCrossRefMathSciNetGoogle Scholar
  118. 118.
    Craver, S.: Zero knowledge watermark detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  119. 119.
    Pitas, I.: A method for signature casting on digital images. In: Proceedings of ICIP, vol. 3, pp. 215–218 (1996)Google Scholar
  120. 120.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure. In: XI European Signal Processing Conference, vol. I, pp. 446–449 (2003)Google Scholar
  121. 121.
    Damgård, I.B.: Commitment Schemes and Zero-Knowledge Protocols. In: Damgård, I.B. (ed.) EEF School 1998. LNCS, vol. 1561, Springer, Heidelberg (1999)CrossRefGoogle Scholar
  122. 122.
    Schneier, B.: Applied cryptography. Computer Networking and Distributed Systems. John Wiley & Sons, Chichester (1994)Google Scholar
  123. 123.
    Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 32–46. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  124. 124.
    Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  125. 125.
    Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VIII, San José, California, USA. SPIE (2006)Google Scholar
  126. 126.
    Katzenbeisser, S.: On the integration of watermarks and cryptography. In: International Workshop on Digital Watermarking, pp. 50–60 (2003)Google Scholar
  127. 127.
    Adelsbach, A., Rohe, M., Sadeghi, A.R.: Overcoming the obstacles of zero-knowledge watermark detection. In: Proceedings of Multimedia and Security Workshop, pp. 46–55 (2004)Google Scholar
  128. 128.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (5th reprint, 2001)Google Scholar
  129. 129.
    Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-interactive watermark detection for a correlation-based watermarking scheme. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 129–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  130. 130.
    Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53, 824–833 (2005)CrossRefMathSciNetGoogle Scholar
  131. 131.
    Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, California, USA. SPIE, vol. 4675, pp. 50–56 (2002)Google Scholar
  132. 132.
    Cachin, C.: An information-theoretic model for steganography. Information and Computation 192, 41–56 (2004)MATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Luis Pérez-Freire
    • 1
  • Pedro Comesaña
    • 1
  • Juan Ramón Troncoso-Pastoriza
    • 1
  • Fernando Pérez-González
    • 1
  1. 1.Signal Theory and Communications DepartmentUniversity of VigoVigoSpain

Personalised recommendations