Watermarking techniques allow the tracing of pirated copies of data by modifying each copy as it is distributed, embedding hidden information into the data which identifies the owner of that copy. The owner of the original data can then identify the source of a pirated copy by reading out the hidden information present in that copy. Naturally, one would like these schemes to be as efficient as possible. Previous analyses measured efficiency in terms of the amount of data needed to allow many different copies to be distributed; in order to hide enough data to distinguish many users, the total original data must be sufficiently large. Here, we consider a different notion of efficiency: What resources does the watermark detector need in order to perform this tracing? We address this question in two ways. First, we present a modified version of the CKLS media watermarking algorithm which improves the detector running time from linear to polylogarithmic in the number of users while still maintaining collusion-security. Second, we show that any public, invertible watermarking scheme secure against c colluding adversaries must have at least fΩ(c) bits of secret information.
CITATION STYLE
Zane, F. (2001). Efficient watermark detection and collusion security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1962, pp. 21–32). Springer Verlag. https://doi.org/10.1007/3-540-45472-1_2
Mendeley helps you to discover research relevant for your work.