From weak to strong watermarking

Nick Hopper, David Molnar, David Wagner

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

The informal goal of a watermarking scheme is to "mark" a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.

Original languageEnglish (US)
Title of host publicationTheory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings
Pages362-382
Number of pages21
StatePublished - Dec 1 2007
Event4th Theory of Cryptography Conference, TCC 2OO7 - Amsterdam, Netherlands
Duration: Feb 21 2007Feb 24 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4392 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th Theory of Cryptography Conference, TCC 2OO7
CountryNetherlands
CityAmsterdam
Period2/21/072/24/07

Fingerprint

Watermarking
Imply

Cite this

Hopper, N., Molnar, D., & Wagner, D. (2007). From weak to strong watermarking. In Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings (pp. 362-382). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4392 LNCS).

From weak to strong watermarking. / Hopper, Nick; Molnar, David; Wagner, David.

Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. 2007. p. 362-382 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hopper, N, Molnar, D & Wagner, D 2007, From weak to strong watermarking. in Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4392 LNCS, pp. 362-382, 4th Theory of Cryptography Conference, TCC 2OO7, Amsterdam, Netherlands, 2/21/07.
Hopper N, Molnar D, Wagner D. From weak to strong watermarking. In Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. 2007. p. 362-382. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hopper, Nick ; Molnar, David ; Wagner, David. / From weak to strong watermarking. Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. 2007. pp. 362-382 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{4d28115e17d346208112b7e5d8a1b35d,
title = "From weak to strong watermarking",
abstract = "The informal goal of a watermarking scheme is to {"}mark{"} a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.",
author = "Nick Hopper and David Molnar and David Wagner",
year = "2007",
month = "12",
day = "1",
language = "English (US)",
isbn = "9783540709350",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "362--382",
booktitle = "Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings",

}

TY - GEN

T1 - From weak to strong watermarking

AU - Hopper, Nick

AU - Molnar, David

AU - Wagner, David

PY - 2007/12/1

Y1 - 2007/12/1

N2 - The informal goal of a watermarking scheme is to "mark" a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.

AB - The informal goal of a watermarking scheme is to "mark" a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.

UR - http://www.scopus.com/inward/record.url?scp=38049059190&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38049059190&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540709350

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 362

EP - 382

BT - Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings

ER -