Skip to main content

Cryptography and Data Hiding for Media Security

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 120))

Summary

Recently, researchers involved in the watermarking field concentrated their attention to the security aspects. In a watermarking application one of the most important phases from the point of view of security, is the watermark extraction process: a prover has to prove to a verifier that a given watermark is present into the content. In the design of the scheme, it has to be considered that the prover is not trusted, since could try to exploit the knowledge acquired during watermark extraction to attack the security of the watermarking system. To tackle this issue, a possible solution consists in using cryptographic tools, defined zero-knowledge protocols, for building a secure layer on top of the watermarking channel, able to protect the watermarking algorithm against a possible information leakage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, Los Altos, CA (2001)

    Google Scholar 

  2. Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)

    Google Scholar 

  3. Pan, J.S., Huang, H.C., Jain, L.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)

    MATH  Google Scholar 

  4. Pan, J.S., Huang, H.C., Jain, L., Fang, W.C.: Intelligent Multimedia Data Hiding. Springer, Berlin Heidelberg New York (2007)

    Book  Google Scholar 

  5. Kalker, T.: Considerations on watermarking security. In: Proceedings of the IEEE Multimedia Signal Processing MMSP’01 Workshop, Cannes, France (October 2001) 201-206

    Google Scholar 

  6. Barni, M., Bartolini, F., Furon, T.: A general framework for robust water-marking security. Signal Processing: Special Issue on Security of Data Hiding Technologies 83(10) (October 2003) 2069-2084

    MATH  Google Scholar 

  7. Furon, T., Oostven, J., Van Bruggen, J.: Security analysis. Deliverable D.5.5, CERTIMARK IST European Project (2002)

    Google Scholar 

  8. Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Processing Magazine 21(2) (2004) 28-39

    Article  Google Scholar 

  9. Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the X European Signal Processing Confer-ence, EUSIPCO’00. Vol. 3, Tampere, Finland (September 2000) 1685-1688

    Google Scholar 

  10. Furon, T., Duhamel, P.: Robustness of an asymmetric watermarking technique. In: Proceedings of the Seventh IEEE International Conference on Image Process-ing, ICIP’00. Vol. 3, Vancouver, Canada (September 2000) 21-24

    Google Scholar 

  11. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems 9(3) (2003) 266-278

    Article  Google Scholar 

  12. Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric water-marking schemes. In: Wong, P.W., Delp, E. eds.: Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)

    Google Scholar 

  13. Smart, N.: Cryptography: An Introduction. McGraw-Hill, New York (2003)

    Google Scholar 

  14. Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)

    MATH  Google Scholar 

  15. Damgaard, I.: Commitment schemes and zero-knowledge protocols. In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, Springer-Verlag, New York (July 1998) 63-86

    Google Scholar 

  16. Goldreich, O.: Zero-knowledge twenty years after their invention survey, March 2004, available on-line at http://www.wisdom.weizmann.ac.il/oded/PS/zk-tut02v4.ps

  17. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interac-tive proof-systems. In: (extended abstract), In: ACM Symposium on Theory of Computing (1985) 291-304

    Google Scholar 

  18. Quisquater, J.J., Quisquater, M., Quisquater, M., Quisquater, M., Guillou, L.C., Guillou, M.A., Guillou, G., Guillou, A., Guillou, G., Guillou, S., Berson, T.A.: How to explain zero-knowledge protocols to your children. CRYPTO (1989) 628-631

    Google Scholar 

  19. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for design- ing efficient protocols. (1993) 62-73

    Google Scholar 

  20. Katzenbeisser, S.: On the integration of watermarks and cryptography. IWDW (2003)50-60

    Google Scholar 

  21. Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. Information Hiding (2001) 273-288

    Google Scholar 

  22. Troncoso-Pastoriza, J.R., Perez-Gonzalez, F.: Zero-knowledge watermark detec-tor robust to sensitivity attacks. In: Proceedings of the VIII ACM Multimedia and Security Workshop 2006. ACM Press, New York (26-27 September 2006) 97-107

    Chapter  Google Scholar 

  23. Craver, S.: Zero knowledge watermark detection. Information Hiding (1999) 101-116

    Google Scholar 

  24. Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verifica- tion. IEEE MultiMedia 8(4) (2001) 66-70

    Article  Google Scholar 

  25. Adelsbach, A., Rohe, M., Sadeghi, A.R.: Overcoming the obstacles of zero-knowledge watermark detection. In: MM&Sec ’04: Proceedings of the 2004 Mul-timedia and Security Workshop on Multimedia and Security. ACM Press, New York (2004) 46-55

    Chapter  Google Scholar 

  26. Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: Blind Newton sensitivity attack. Information Security, IEE Proceedings 153(3) (2006) 115-125

    Article  Google Scholar 

  27. Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verifica-tion. In: Proceedings of Multimedia and Security, Workshop at ACM Multime-dia, Orlando, Florida (1999) 91-94

    Google Scholar 

  28. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum wa- termarking for multimedia. IEEE Transactions on Image Processing6(12) (December 1997) 1673-1687

    Google Scholar 

  29. Rivest, R.L., Shamir, A., Adelman, L.: On digital signatures and public key cryptosystems. MIT Laboratory for Computer Science Technical Memorandum 82(April 1977)

    Google Scholar 

  30. Pitas, I.: A method for signature casting on digital images. In: IEEE Interna-tional Conference on Image Processing (ICIP’96). Vol. 3, Lausanne, Switzerland (September 1996) 215-218

    Google Scholar 

  31. Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications 16(4) (May 1998) 573-587. Special issue on copyright and privacy protection.

    Google Scholar 

  32. Craver, S., Liu, B., Wolf, W.: An implementation of, and attacks on, zero-knowledge watermarking. Lecture Notes in Computer Science, Toronto, Canada. Springer Verlag, New York (May 23-25 2004) 1-12

    Google Scholar 

  33. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets water-marking: Detecting watermarks with minimal or zero knowledge disclosure. In: European Signal Processing Conference 2002, Toulouse, France (2002)

    Google Scholar 

  34. Ard, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y., ed.: ASIACRYPT. Vol. 2501 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York (2002)125-142

    Google Scholar 

  35. Camenisch, J., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. EUROCRYPT (1999) 107-122

    Google Scholar 

  36. Boudot, F.: Efficient proofs that a committed number lies in an interval. EUROCRYPT (2000) 431-444

    Google Scholar 

  37. Adelsbach, A., Rohe, M., Sadeghi, A.R.: Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data. Transactions on Data Hiding and Multimedia Security I 4300 (2006) 73-103

    Google Scholar 

  38. Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing 66(3) (May 1998) 357-372

    Article  MATH  Google Scholar 

  39. Troncoso, J.R., Perez-Gonzalez, F.: Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks. In: Wong, P.W., Delp, E.J., eds.: Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, Vol. 6505, San Jose, CA, USA (January 2007) 12

    Google Scholar 

  40. Hernandez, J.R., Amado, M., Perez-Gonzales, F.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing 9(1) (Jan 2000) 55-68

    Article  Google Scholar 

  41. Lipmaa, H.: On diophantine complexity and statistical zero-knowledge argu-ments. In: Laih, C.S., ed.: ASIACRYPT. Vol. 2894 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York (2003) 398-415

    Google Scholar 

  42. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transac-tions on Information Theory 47(4) (May 2001) 1423-1443

    Article  MATH  MathSciNet  Google Scholar 

  43. Eggers, J., B. Girod: Informed Watermarking. Kluwer, Dordecht (2002)

    Google Scholar 

  44. Malkin, M., Kalker, T.: A cryptographic method for secure watermark detec-tion. In: Proceedings of the Eigth International Workshop on Information Hid-ing, IH’06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA. Springer Verlag, New York (10-12 July 2006)

    Google Scholar 

  45. Venturini, I.: Counteracting oracle attacks. In: MM&Sec ’04: Proceedings of the 2004 Workshop on Multimedia and Security, New York, NY, USA. ACM Press, New York (2004) 187-192

    Chapter  Google Scholar 

  46. Barni, M., Bartolini, F., Piva, A.: Performance analysis of st-dm watermarking in presence of nonadditive attack. IEEE Transactions on Signal Processing, Supplement on Secure Media 52(10) (October 2004) 2965-2974

    Google Scholar 

  47. Pailler, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt’99, Lecture Notes is Computer Science, Vol. 1592. Springer-Verlag, New York (1999) 223-238

    Google Scholar 

  48. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28(2) (1984) 270-299

    Article  MATH  MathSciNet  Google Scholar 

  49. Piva, A., Cappellini, V., Corazzi, D., Rosa, A.D., Orlandi, C., Barni, M.: Zero-knowledge st-dm watermarking. In: Wong, P.W., Delp, E., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, Proceedings of SPIE, Vol. 6072, San Jose, CA, USA, SPIE (16-19 January 2006) 0R-1-0R-10

    Google Scholar 

  50. Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzalez, F.: Detection in quantization-based watermarking: performance and security issues, San Jose, CA, USA (January 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Piva, A. (2008). Cryptography and Data Hiding for Media Security. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Studies in Computational Intelligence, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78502-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78502-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78491-3

  • Online ISBN: 978-3-540-78502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics