Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data

被引:0
作者
Adelsbach, Andre [1 ]
Rohe, Markus
Sadeghi, Ahmad-Reza
机构
[1] Ruhr Univ Bochum, Chair Network & Data Secur, D-4630 Bochum, Germany
[2] Ruhr Univ Bochum, Appl Data Secur Grp, D-4630 Bochum, Germany
来源
TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1 | 2006年 / 4300卷
关键词
watermark; detection; implementation; zero-knowledge;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Robust digital watermarking systems are important building blocks in applications such as fingerprinting, dispute resolving or direct proofs of authorship, where the presence of a watermark serves as evidence for some fact, e.g., illegal redistribution or authorship. A major drawback of (symmetric) watermarking schemes in this context is that proving the presence of a watermark requires disclosing security critical detection information (watermark, detection key, original data) to a (potentially malicious) verifying party. This may completely jeopardise the security of embedded watermarks once this information is revealed. To overcome this problem recent work on secure watermark detection proposes cryptographic proofs that perform the detection on concealed detection information. The proposed solutions focus on correlation-based detection and can be applied to any watermarking scheme whose detection criteria can be expressed as a polynomial relation between the quantities required for the detection. In this paper, we present in-depth guidelines for the adoptions required to transform well-established watermarking schemes by Cox et al and Piva et al into secure cryptographic proofs in the non-interactive setting. Moreover, we present our implementation, its performance results and the corresponding tool we have developed for this purpose. Our results underpin the practicability of the cryptographic approach.
引用
收藏
页码:73 / 103
页数:31
相关论文
共 32 条
[1]  
Adelsbach A, 2005, LECT NOTES COMPUT SC, V3677, P129
[2]   Watermark detection with zero-knowledge disclosure [J].
Adelsbach, A ;
Katzenbeisser, S ;
Sadeghi, AR .
MULTIMEDIA SYSTEMS, 2003, 9 (03) :266-278
[3]   Advanced techniques for dispute resolving and authorship proofs on digital works [J].
Adelsbach, A ;
Sadeghi, AR .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :677-688
[4]  
ADELSBACH A, 2005, SPEC SESS MED SEC WI, P13
[5]  
Adelsbach A., 2001, LNCS, P273, DOI [10.1007/3-540-45496-9_20, DOI 10.1007/3540-454969_20]
[6]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[7]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[8]  
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[9]  
CHOUBASSI ME, 2005, P SPIE IS T EL IM SA, V5681, P734
[10]  
Comesaña P, 2005, LECT NOTES COMPUT SC, V3710, P260