Protocols for Watermark Veriication
نویسندگان
چکیده
Digital watermarks have recently been proposed for the purpose of copy deterrence of multimedia content. Copy deterrence using digital watermarks is achieved by inserting a unique watermark into each copy of the image sold which could be used to trace unauthorized copies to the erring buyer. However, all the schemes proposed in the literature suuer from the following major limitation which is generally glossed over. The owner of the image reveals the embedded watermark to the buyer or to a \trusted" third party in the process of proving that a pirated copy originated from a speciic buyer. Needless to say that the watermark could subsequently be removed from the watermarked image by the buyer or the \trusted" third party. This leads to the same fundamental problem viz., the buyer or the \trusted" third party could now sell illegal copies with complete impunity. While this limitation appears to be inherent, it can actually be eliminated by using appropriate cryptographic protocols. In this paper, we present a novel way of demonstrating the presence of a watermark in an image without revealing knowledge about the watermark to the other party, thereby eliminating the possibility of subsequent watermark removal.
منابع مشابه
Printed Copies: Printed Copies: Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols
Electronic copies of technical reports are available: Via FTP: URL ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports Via WWW: URL http://www.informatik.uni-trier.de/Reports/Current.html Via email: Send a mail to [email protected], subject ’HELP’, for detailed instructions Printed copies: Trierer Forschungsberichte Fachbereich IV Mathematik / Informatik Universitat Trier ..
متن کاملZero Knowledge Watermark Verification Protocols
Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Several different schemes have been proposed in the last few years, but most of them are symmetric, i.e., the key used for watermark embedding is just the same used for watermark detection. However, in many applications, an asymmetric scheme is needed, where the secrete inform...
متن کاملComparison of SPIN and VIS for ProtocolVeri
Nowadays, there exists a wide variety of veriication tools. Some, like SPIN, are designed and mainly used for the veriication of software systems, such as communications protocols. Others, like VIS, are designed and used for hardware systems veriication. In this paper, we compare and contrast SPIN and VIS. In particular, we devote a special attention to the eeciency of these tools for the verii...
متن کاملThe use of Watermarks in the Protection of Digital
The watermarking of digital images, audio, video and multimedia products in general has been proposed for resolving copyright ownership and verifying originality of content. This paper studies the contribution of watermarking for developing protection schemes. A general watermarking framework (GWF) is studied and the fundamental demands are listed. The watermarking algorithms, namely watermark ...
متن کاملZero-Knowledge Watermark Detection and Proof of Ownership
The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven) and coverage (handle only blind watermark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001