A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Digital watermarking
Proving Ownership of Digital Content
IH '99 Proceedings of the Third International Workshop on Information Hiding
The effects of invisible watermarking on satellite image classification
Proceedings of the 3rd ACM workshop on Digital rights management
IEEE Journal on Selected Areas in Communications
Traitor tracing for prerecorded and recordable media
Proceedings of the 4th ACM workshop on Digital rights management
Watermarking and ownership problem: a revisit
Proceedings of the 5th ACM workshop on Digital rights management
Zero-knowledge watermark detection resistant to ambiguity attacks
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A new approach to countering ambiguity attacks
Proceedings of the 9th workshop on Multimedia & security
Attacks on a robust watermarking scheme based on self-reference image
Computer Standards & Interfaces
Attack on a semi-blind watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Security models of digital watermarking
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
On the possibility of non-invertible watermarking schemes
IH'04 Proceedings of the 6th international conference on Information Hiding
An ID-based watermarking scheme for java programs
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An efficient dispute resolving method for digital images
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ambiguity attacks on the ganic-eskicioglu robust DWT-SVD image watermarking scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
New attacks on timing-based network flow watermarks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Consideration of the watermark inversion attack and its invalidation framework
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Protocol attacks against watermarking schemes pose a threat to modern digital rights management systems; for example, a successful attack may allow to copy a watermark between two digital objects or to forge a valid watermark. Such attacks enable a traitor to hinder a dispute resolving process or accuse an innocent party of a copyright infringement. Secure DRM systems based on watermarks must therefore prevent such protocol attacks. In this paper we introduce a formal framework that enables us to assert rigorously the security of watermarks against protocol attacks. Furthermore, we show how watermarking schemes can be secured against some protocol attacks by using a cryptographic signature of a trusted third party.