Paper
27 February 2007 Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks
Author Affiliations +
Abstract
Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensitivity attacks, for which zero-knowledge does not provide protection. In this paper, an efficient zero-knowledge version of the Generalized Gaussian Maximum Likelihood (ML) detector is introduced. The inherent robustness that this detector presents against sensitivity attacks, together with the security provided by the zero-knowledge protocol that conceals the keys that could be used to remove the watermark or to produce forged assets, results in a robust and secure protocol. Two versions of the zero-knowledge detector are presented; the first one makes use of two new zero-knowledge proofs for modulus and square root calculation; the second is an improved version applicable when the spreading sequence is binary, and it has minimum communication complexity. Completeness, soundness and zero-knowledge properties of the developed protocols are proved, and they are compared with previous zero-knowledge watermark detection protocols in terms of receiver operating characteristic, resistance to sensitivity attacks and communication complexity.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Juan Ramón Troncoso and Fernando Pérez-González "Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks", Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65050B (27 February 2007); https://doi.org/10.1117/12.704171
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Sensors

Binary data

Information security

Receivers

Signal detection

Distortion

RELATED CONTENT

New sensitivity analysis attack
Proceedings of SPIE (March 21 2005)
Two different approaches for attacking BOWS
Proceedings of SPIE (February 27 2007)
The blind Newton sensitivity attack
Proceedings of SPIE (February 15 2006)

Back to Top