From weak to strong watermarking

Nicholas Hopper, David Molnar, David Wagner

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

Abstract

The informal goal of a watermarking scheme is to "mark" a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.

Original languageEnglish (US)
Title of host publicationTheory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings
PublisherSpringer Verlag
Pages362-382
Number of pages21
ISBN (Print)9783540709350
DOIs
StatePublished - 2007
Event4th Theory of Cryptography Conference, TCC 2OO7 - Amsterdam, Netherlands
Duration: Feb 21 2007Feb 24 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4392 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th Theory of Cryptography Conference, TCC 2OO7
Country/TerritoryNetherlands
CityAmsterdam
Period2/21/072/24/07

Fingerprint

Dive into the research topics of 'From weak to strong watermarking'. Together they form a unique fingerprint.

Cite this