How to construct random functions
Journal of the ACM (JACM)
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Computer security
Digital watermarking
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Security and Watermarking of Multimedia Contents
Security and Watermarking of Multimedia Contents
Security and Watermaking of Multimedia Contents II
Security and Watermaking of Multimedia Contents II
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Revised Papers from the 5th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Fast public-key watermarking of compressed video
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking schemes provably secure against copy and ambiguity attacks
Proceedings of the 3rd ACM workshop on Digital rights management
Watermarking subdivision surfaces based on addition property of Fourier transform
Proceedings of the 2nd international conference on Computer graphics and interactive techniques in Australasia and South East Asia
On obfuscating point functions
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Security, Steganography, And Watermarking Of Multimedia Contents VI (Proceedings of S P I E)
Security, Steganography, And Watermarking Of Multimedia Contents VI (Proceedings of S P I E)
Security, Steganography And Watermarking of Multimedia Contents VII (Proceedings of S P I E)
Security, Steganography And Watermarking of Multimedia Contents VII (Proceedings of S P I E)
Improved QIM strategies for gaussian watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Proceedings of the 6th international conference on Information Hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
On the possibility of non-invertible watermarking schemes
IH'04 Proceedings of the 6th international conference on Information Hiding
Optimal error correction against computationally bounded noise
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Upper and lower bounds on black-box steganography
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
A spread spectrum watermarking scheme based on periodic clock changes for digital images
IH'05 Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
IEEE Journal on Selected Areas in Communications
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Security models of digital watermarking
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Security of invertible media authentication schemes revisited
IH'07 Proceedings of the 9th international conference on Information hiding
Hi-index | 0.00 |
The informal goal of a watermarking scheme is to "mark" a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.