Paper
29 April 2002 Securing symmetric watermarking schemes against protocol attacks
Stefan Katzenbeisser, Helmut Veith
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465283
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
With the advent of the web and the creation of electronic distribution channels for multimedia objects, there is an increased risk of copyright infringements. Content providers try to alleviate this problem by using copyright protection facilities that often involve watermarking schemes as primitives. Clearly, the intention of the content provider can be subverted if the watermarking scheme is susceptible to intentional attacks, especially to attacks on the robustness of watermarks. It was noted early during the development of watermarking algorithms that the intention of resolving the copyright situation might be subverted entirely without removing any watermark contained in multimedia objects. Indeed, so-called protocol attacks try to introduce some sort of ambiguity during the copyright resolution process. After providing formal definitions for some common protocol attacks, we discuss the possibility of constructing watermarking schemes that are provably secure against ambiguity and copy attacks. Although there were several previous attempts to secure watermarking schemes against protocol attacks, we provide for the first time a formal security proof of our scheme. The security of the construction is based on a cryptographic primitive, namely an unforgeable public-key signature scheme, that is used to constrain the watermarking bits to have a specific form.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stefan Katzenbeisser and Helmut Veith "Securing symmetric watermarking schemes against protocol attacks", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465283
Lens.org Logo
CITATIONS
Cited by 21 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Multimedia

Signal processing

Algorithm development

Information security

Oxygen

Computer simulations

RELATED CONTENT

Elliptic curve cryptography
Proceedings of SPIE (April 22 2022)
Security analysis of public key watermarking schemes
Proceedings of SPIE (December 05 2001)
Profiles for evaluation: the usage of audio WET
Proceedings of SPIE (February 17 2006)
Maximum-likelihood blind equalization
Proceedings of SPIE (December 01 1991)
Defining security in steganographic systems
Proceedings of SPIE (April 29 2002)

Back to Top