Securing symmetric watermarking schemes against protocol attacks

被引:27
作者
Katzenbeisser, S [1 ]
Veith, H [1 ]
机构
[1] Vienna Univ Technol, Inst Informat Syst, Database & Artificial Intelligence Grp, A-1040 Vienna, Austria
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
watermarking; protocol attacks; inversion; cryptographic signature;
D O I
10.1117/12.465283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the web and the creation of electronic distribution channels for multimedia objects, there is an increased risk of copyright infringements. Content providers try to alleviate this problem by using copyright protection facilities that often involve watermarking schemes as primitives. Clearly, the intention of the content provider can be subverted if the watermarking scheme is susceptible to intentional attacks, especially to attacks on the robustness of watermarks. It was noted early during the development of watermarking algorithms that the intention of resolving the copyright situation might be subverted entirely without removing any watermark contained in multimedia objects. Indeed, so-called protocol attacks try to introduce some sort of ambiguity during the copyright resolution process. After providing formal definitions for some common protocol attacks, we discuss the possibility of constructing watermarking schemes that are provably secure against ambiguity and copy attacks. Although there were several previous attempts to secure watermarking schemes against protocol attacks, we provide for the first time a formal security proof of our scheme. The security of the construction is based on a cryptographic primitive, namely an unforgeable public-key signature scheme, that is used to constrain the watermarking bits to have a specific form.
引用
收藏
页码:260 / 268
页数:9
相关论文
共 12 条
[1]   Some general methods for tampering with watermarks [J].
Cox, IJ ;
Linnartz, JPMG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :587-593
[2]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[3]  
Craver S, 2001, INT FED INFO PROC, V64, P159
[4]  
Craver S, 2000, LECT NOTES COMPUT SC, V1768, P101
[5]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[6]  
Goldwasser S., 1996, LECT NOTES CRYPTOGRA
[7]  
Johnson NF, 2000, LECT NOTES COMPUT SC, V1768, P318
[8]  
KATZENBEISSER S, 2001, RECENT ADV RSA CRYPT
[9]   The watermark copy attack [J].
Kutter, M ;
Voloshynovskiy, S ;
Herrigel, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :371-380
[10]  
QIAO J, 1999, P SOC PHOTO-OPT INS, V3675, P194