Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Digital watermarking
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Public-Key Cryptography
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Fast public-key watermarking of compressed video
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Robust non-interactive zero-knowledge watermarking scheme against cheating prover
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An improved asymmetric watermarking system using matrix embedding
IH'06 Proceedings of the 8th international conference on Information hiding
Cryptanalysis of barni et al. watermarking scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data
Transactions on Data Hiding and Multimedia Security I
Hi-index | 0.00 |
A problem of considerable theoretical interest in digital watermarking is that of asymmetric, or zero-knowledge watermarking. In this problem, we wish to embed a watermark in a piece of multimedia and later prove that we have done so, but without revealing information that can be used by an adversary to remove the signal later. In this paper we develop a watermarking system based on the ambiguity attack method outlined in [14], constructing a vector-based watermarking system applicable to images, audio and video. An example of image watermarking is provided. We also outline some important attacks and thus important design principles for asymmetric watermarking systems.