Efficient watermark detection and collusion security

20Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Watermarking techniques allow the tracing of pirated copies of data by modifying each copy as it is distributed, embedding hidden information into the data which identifies the owner of that copy. The owner of the original data can then identify the source of a pirated copy by reading out the hidden information present in that copy. Naturally, one would like these schemes to be as efficient as possible. Previous analyses measured efficiency in terms of the amount of data needed to allow many different copies to be distributed; in order to hide enough data to distinguish many users, the total original data must be sufficiently large. Here, we consider a different notion of efficiency: What resources does the watermark detector need in order to perform this tracing? We address this question in two ways. First, we present a modified version of the CKLS media watermarking algorithm which improves the detector running time from linear to polylogarithmic in the number of users while still maintaining collusion-security. Second, we show that any public, invertible watermarking scheme secure against c colluding adversaries must have at least fΩ(c) bits of secret information.

Cite

CITATION STYLE

APA

Zane, F. (2001). Efficient watermark detection and collusion security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1962, pp. 21–32). Springer Verlag. https://doi.org/10.1007/3-540-45472-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free