An Implementation of, and Attacks on, Zero-Knowledge Watermarking

8Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A problem of considerable theoretical interest in digital watermarking is that of asymmetric, or zero - knowledge watermarking. In this problem, we wish to embed a watermark in a piece of multimedia and later prove that we have done so, but without revealing information that can be used by an adversary to remove the signal later. In this paper we develop a watermarking system based on the ambiguity attack method outlined in [14], constructing a vector - based watermarking system applicable to images, audio and video. An example of image watermarking is provided. We also outline some important attacks and thus important design principles for asymmetric watermarking systems. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Graver, S., Liu, B., & Wolf, W. (2004). An Implementation of, and Attacks on, Zero-Knowledge Watermarking. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3200, 1–12. https://doi.org/10.1007/978-3-540-30114-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free