Protocols for Watermark Verification
نویسندگان
چکیده
deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it. C onsider an application where multi-media content is electronically distributed over a network. To discourage unauthorized duplication and distribution, the content owner can embed a unique watermark (or a fingerprint) in each distributed copy of the data. If the owner later finds unauthorized copies of the data, then the origin of the copy and the identity of the erring buyer could be determined by retrieving the unique watermark corresponding to each buyer. These schemes are sometimes called copy deterrence watermarking schemes or digital fingerprinting schemes. We'll focus our attention on digital image watermarking, although the same problems exist for other multimedia data, such as video or audio. A watermark is a signal added to the digital image that can later be extracted or detected to make an assertion about the image. 1 Two types of watermarks exist: visible and invisible. Visible watermarks typically contain conspicuously visible messages or company logos indicating the ownership of the image. Invisible watermarks, on the other hand, are unobtrusive modifications to the image and the invisibly watermarked image visually appears similar to the original. Users can determine the existence of an invisible watermark only by using an appropriate watermark extraction or detection algorithm. Companies generally prefer invisible watermarks as their unobtrusiveness makes them more desirable. We can also classify watermarking techniques as fragile and robust. Any image processing procedure will corrupt a fragile watermark, whereas a robust watermark can resist common image manipulation procedures (such as rotation, reflection , scaling, cropping, smoothing, contrast or brightness adjustment, or lossy compression). Clearly, a watermark used for the purpose of copy deterrence must be robust. Yet another classification of watermarking techniques is into oblivious and nonoblivious schemes. A nonoblivious scheme requires an original or reference image in the watermark detection procedure. On the other hand, an oblivious scheme doesn't require the use of an original or reference image. Thus, oblivious schemes are attractive for many applications. In copy deterrence watermarking schemes, the watermarks used are generally invisible, robust, and oblivious. Recall that we deter copying by inserting a unique watermark into each copy of the image sold (which we can use to trace unauthorized copies to …
منابع مشابه
Zero Knowledge Watermark Verification Protocols
Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Several different schemes have been proposed in the last few years, but most of them are symmetric, i.e., the key used for watermark embedding is just the same used for watermark detection. However, in many applications, an asymmetric scheme is needed, where the secrete inform...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملZero-Knowledge Watermark Detection and Proof of Ownership
The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven) and coverage (handle only blind watermark...
متن کاملImage Ownership Verification via Private Pattern and Watermarking Wavelet Filters
In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly achieved within the process of decomposition and reconstruction by forging watermark-carrying wavelet filters. This scheme improves the watermark robustness and invisibility since it maximally avoids inserting the watermark into t...
متن کاملDigital Signatures Based on Invertible Watermarks for Video Authentication
For verification and authentication of the video material and recovery of the original video several security mechanisms are required. The security techniques to realize this solution are introduced in [1]: 1. The verification of the integrity is verified by hash functions. 2. Authenticity is verified by digital signatures using asymmetric cryptography and hash functions. The introduced scheme ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE MultiMedia
دوره 8 شماره
صفحات -
تاریخ انتشار 2001