Share Email Print

Proceedings Paper

Zero-knowledge ST-DM watermarking
Author(s): A. Piva; V. Cappellini; D. Corazzi; A. De Rosa; C. Orlandi; M. Barni
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Recently the research in the watermarking field has concentrated its attention to the security aspects. In a watermarking application one of the most sensitive steps from the point of view of security, is the watermark extraction process: here, a prover has to prove to a verifier that a given watermark is present into the content. In the design of the system, it has to be considered that the prover is not a trusted party: the prover could try to exploit the knowledge acquired during watermark extraction to remove the embedded code and, consequently, to undermine the security of the watermarking system. To tackle this particular issue, it has been proposed to use some cryptographic techniques, defined zero-knowledge protocols, for building a secure layer on top of the watermarking channel, able to protect the watermarking algorithm against a possible information leakage. Up till now, zero-knowledge protocols have been applied to spread-spectrum based detectable watermarking algorithms. In this paper, a novel zero-knowledge protocol designed for a Spread Transform Dither Modulation (ST-DM) watermarking algorithm, belonging to the class of the informed watermarking systems, is proposed.

Paper Details

Date Published: 15 February 2006
PDF: 11 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720R (15 February 2006); doi: 10.1117/12.644180
Show Author Affiliations
A. Piva, Univ. of Florence (Italy)
V. Cappellini, Univ. of Florence (Italy)
D. Corazzi, Univ. of Florence (Italy)
A. De Rosa, Univ. of Florence (Italy)
C. Orlandi, Univ. of Florence (Italy)
M. Barni, Univ. of Siena (Italy)

Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?