Summary
Recently, researchers involved in the watermarking field concentrated their attention to the security aspects. In a watermarking application one of the most important phases from the point of view of security, is the watermark extraction process: a prover has to prove to a verifier that a given watermark is present into the content. In the design of the scheme, it has to be considered that the prover is not trusted, since could try to exploit the knowledge acquired during watermark extraction to attack the security of the watermarking system. To tackle this issue, a possible solution consists in using cryptographic tools, defined zero-knowledge protocols, for building a secure layer on top of the watermarking channel, able to protect the watermarking algorithm against a possible information leakage.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, Los Altos, CA (2001)
Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)
Pan, J.S., Huang, H.C., Jain, L.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)
Pan, J.S., Huang, H.C., Jain, L., Fang, W.C.: Intelligent Multimedia Data Hiding. Springer, Berlin Heidelberg New York (2007)
Kalker, T.: Considerations on watermarking security. In: Proceedings of the IEEE Multimedia Signal Processing MMSP’01 Workshop, Cannes, France (October 2001) 201-206
Barni, M., Bartolini, F., Furon, T.: A general framework for robust water-marking security. Signal Processing: Special Issue on Security of Data Hiding Technologies 83(10) (October 2003) 2069-2084
Furon, T., Oostven, J., Van Bruggen, J.: Security analysis. Deliverable D.5.5, CERTIMARK IST European Project (2002)
Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Processing Magazine 21(2) (2004) 28-39
Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the X European Signal Processing Confer-ence, EUSIPCO’00. Vol. 3, Tampere, Finland (September 2000) 1685-1688
Furon, T., Duhamel, P.: Robustness of an asymmetric watermarking technique. In: Proceedings of the Seventh IEEE International Conference on Image Process-ing, ICIP’00. Vol. 3, Vancouver, Canada (September 2000) 21-24
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems 9(3) (2003) 266-278
Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric water-marking schemes. In: Wong, P.W., Delp, E. eds.: Security and Watermarking of Multimedia Contents III, San Jose, Cal., USA, SPIE (2001)
Smart, N.: Cryptography: An Introduction. McGraw-Hill, New York (2003)
Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Damgaard, I.: Commitment schemes and zero-knowledge protocols. In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, Springer-Verlag, New York (July 1998) 63-86
Goldreich, O.: Zero-knowledge twenty years after their invention survey, March 2004, available on-line at http://www.wisdom.weizmann.ac.il/oded/PS/zk-tut02v4.ps
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interac-tive proof-systems. In: (extended abstract), In: ACM Symposium on Theory of Computing (1985) 291-304
Quisquater, J.J., Quisquater, M., Quisquater, M., Quisquater, M., Guillou, L.C., Guillou, M.A., Guillou, G., Guillou, A., Guillou, G., Guillou, S., Berson, T.A.: How to explain zero-knowledge protocols to your children. CRYPTO (1989) 628-631
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for design- ing efficient protocols. (1993) 62-73
Katzenbeisser, S.: On the integration of watermarks and cryptography. IWDW (2003)50-60
Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. Information Hiding (2001) 273-288
Troncoso-Pastoriza, J.R., Perez-Gonzalez, F.: Zero-knowledge watermark detec-tor robust to sensitivity attacks. In: Proceedings of the VIII ACM Multimedia and Security Workshop 2006. ACM Press, New York (26-27 September 2006) 97-107
Craver, S.: Zero knowledge watermark detection. Information Hiding (1999) 101-116
Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verifica- tion. IEEE MultiMedia 8(4) (2001) 66-70
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Overcoming the obstacles of zero-knowledge watermark detection. In: MM&Sec ’04: Proceedings of the 2004 Mul-timedia and Security Workshop on Multimedia and Security. ACM Press, New York (2004) 46-55
Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: Blind Newton sensitivity attack. Information Security, IEE Proceedings 153(3) (2006) 115-125
Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verifica-tion. In: Proceedings of Multimedia and Security, Workshop at ACM Multime-dia, Orlando, Florida (1999) 91-94
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum wa- termarking for multimedia. IEEE Transactions on Image Processing6(12) (December 1997) 1673-1687
Rivest, R.L., Shamir, A., Adelman, L.: On digital signatures and public key cryptosystems. MIT Laboratory for Computer Science Technical Memorandum 82(April 1977)
Pitas, I.: A method for signature casting on digital images. In: IEEE Interna-tional Conference on Image Processing (ICIP’96). Vol. 3, Lausanne, Switzerland (September 1996) 215-218
Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving rightful ownership with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications 16(4) (May 1998) 573-587. Special issue on copyright and privacy protection.
Craver, S., Liu, B., Wolf, W.: An implementation of, and attacks on, zero-knowledge watermarking. Lecture Notes in Computer Science, Toronto, Canada. Springer Verlag, New York (May 23-25 2004) 1-12
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets water-marking: Detecting watermarks with minimal or zero knowledge disclosure. In: European Signal Processing Conference 2002, Toulouse, France (2002)
Ard, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y., ed.: ASIACRYPT. Vol. 2501 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York (2002)125-142
Camenisch, J., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. EUROCRYPT (1999) 107-122
Boudot, F.: Efficient proofs that a committed number lies in an interval. EUROCRYPT (2000) 431-444
Adelsbach, A., Rohe, M., Sadeghi, A.R.: Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data. Transactions on Data Hiding and Multimedia Security I 4300 (2006) 73-103
Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Processing 66(3) (May 1998) 357-372
Troncoso, J.R., Perez-Gonzalez, F.: Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks. In: Wong, P.W., Delp, E.J., eds.: Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, Vol. 6505, San Jose, CA, USA (January 2007) 12
Hernandez, J.R., Amado, M., Perez-Gonzales, F.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing 9(1) (Jan 2000) 55-68
Lipmaa, H.: On diophantine complexity and statistical zero-knowledge argu-ments. In: Laih, C.S., ed.: ASIACRYPT. Vol. 2894 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York (2003) 398-415
Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transac-tions on Information Theory 47(4) (May 2001) 1423-1443
Eggers, J., B. Girod: Informed Watermarking. Kluwer, Dordecht (2002)
Malkin, M., Kalker, T.: A cryptographic method for secure watermark detec-tion. In: Proceedings of the Eigth International Workshop on Information Hid-ing, IH’06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA. Springer Verlag, New York (10-12 July 2006)
Venturini, I.: Counteracting oracle attacks. In: MM&Sec ’04: Proceedings of the 2004 Workshop on Multimedia and Security, New York, NY, USA. ACM Press, New York (2004) 187-192
Barni, M., Bartolini, F., Piva, A.: Performance analysis of st-dm watermarking in presence of nonadditive attack. IEEE Transactions on Signal Processing, Supplement on Secure Media 52(10) (October 2004) 2965-2974
Pailler, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt’99, Lecture Notes is Computer Science, Vol. 1592. Springer-Verlag, New York (1999) 223-238
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28(2) (1984) 270-299
Piva, A., Cappellini, V., Corazzi, D., Rosa, A.D., Orlandi, C., Barni, M.: Zero-knowledge st-dm watermarking. In: Wong, P.W., Delp, E., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, Proceedings of SPIE, Vol. 6072, San Jose, CA, USA, SPIE (16-19 January 2006) 0R-1-0R-10
Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzalez, F.: Detection in quantization-based watermarking: performance and security issues, San Jose, CA, USA (January 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Piva, A. (2008). Cryptography and Data Hiding for Media Security. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Studies in Computational Intelligence, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78502-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-78502-6_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78491-3
Online ISBN: 978-3-540-78502-6
eBook Packages: EngineeringEngineering (R0)