Protocols for Watermark Veriication

نویسندگان

  • K. Gopalakrishnan
  • Nasir Memon
  • Poorvi Vora
چکیده

Digital watermarks have recently been proposed for the purpose of copy deterrence of multimedia content. Copy deterrence using digital watermarks is achieved by inserting a unique watermark into each copy of the image sold which could be used to trace unauthorized copies to the erring buyer. However, all the schemes proposed in the literature suuer from the following major limitation which is generally glossed over. The owner of the image reveals the embedded watermark to the buyer or to a \trusted" third party in the process of proving that a pirated copy originated from a speciic buyer. Needless to say that the watermark could subsequently be removed from the watermarked image by the buyer or the \trusted" third party. This leads to the same fundamental problem viz., the buyer or the \trusted" third party could now sell illegal copies with complete impunity. While this limitation appears to be inherent, it can actually be eliminated by using appropriate cryptographic protocols. In this paper, we present a novel way of demonstrating the presence of a watermark in an image without revealing knowledge about the watermark to the other party, thereby eliminating the possibility of subsequent watermark removal.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Printed Copies: Printed Copies: Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols

Electronic copies of technical reports are available: Via FTP: URL ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports Via WWW: URL http://www.informatik.uni-trier.de/Reports/Current.html Via email: Send a mail to [email protected], subject ’HELP’, for detailed instructions Printed copies: Trierer Forschungsberichte Fachbereich IV Mathematik / Informatik Universitat Trier ..

متن کامل

Zero Knowledge Watermark Verification Protocols

Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Several different schemes have been proposed in the last few years, but most of them are symmetric, i.e., the key used for watermark embedding is just the same used for watermark detection. However, in many applications, an asymmetric scheme is needed, where the secrete inform...

متن کامل

Comparison of SPIN and VIS for ProtocolVeri

Nowadays, there exists a wide variety of veriication tools. Some, like SPIN, are designed and mainly used for the veriication of software systems, such as communications protocols. Others, like VIS, are designed and used for hardware systems veriication. In this paper, we compare and contrast SPIN and VIS. In particular, we devote a special attention to the eeciency of these tools for the verii...

متن کامل

The use of Watermarks in the Protection of Digital

The watermarking of digital images, audio, video and multimedia products in general has been proposed for resolving copyright ownership and verifying originality of content. This paper studies the contribution of watermarking for developing protection schemes. A general watermarking framework (GWF) is studied and the fundamental demands are listed. The watermarking algorithms, namely watermark ...

متن کامل

Zero-Knowledge Watermark Detection and Proof of Ownership

The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven) and coverage (handle only blind watermark...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001