메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 97-107

Zero-knowledge watermark detector robust to sensitivity attacks

Author keywords

Generalized Gaussian detector; Sensitivity attacks; Watermark detection; Zero knowledge

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; MAXIMUM LIKELIHOOD ESTIMATION; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 33750921850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1161366.1161383     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 1442357607 scopus 로고    scopus 로고
    • Watermark detection with zero-knowledge disclosure
    • Spriger-Verlag
    • A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi. Watermark detection with zero-knowledge disclosure. In Multimedia Systems, volume 9, pages 266-278. Spriger-Verlag, 2003.
    • (2003) Multimedia Systems , vol.9 , pp. 266-278
    • Adelsbach, A.1    Katzenbeisser, S.2    Sadeghi, A.-R.3
  • 3
    • 33646128241 scopus 로고    scopus 로고
    • Non-interactive watermark detection for a correlation-based watermarking scheme
    • Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005. Spriger-Verlag, September
    • A. Adelsbach, M. Rohe, and A.-R. Sadeghi. Non-interactive watermark detection for a correlation-based watermarking scheme. In Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005, volume 3677 of Lecture Notes in Computer Science, pages 129-139. Spriger-Verlag, September 2005.
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 129-139
    • Adelsbach, A.1    Rohe, M.2    Sadeghi, A.-R.3
  • 4
    • 84944404911 scopus 로고    scopus 로고
    • Zero-knowledge watermark detection and proof of ownership
    • Information Hiding - 4th International Workshop, IHW 2001. Spriger-Verlag
    • A. Adelsbach and A.-R. Sadeghi. Zero-knowledge watermark detection and proof of ownership. In Information Hiding - 4th International Workshop, IHW 2001, volume 2137 of Lecture Notes in Computer Science, pages 273-288. Spriger-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 273-288
    • Adelsbach, A.1    Sadeghi, A.-R.2
  • 6
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Proceedings of CRYPTO'92. Springer-Verlag
    • M. Bellare and O. Goldreich. On defining proofs of knowledge. In Proceedings of CRYPTO'92, volume 740 of Lecture, Notes in Computer Science, pages 390-420. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 7
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of ACM Computer and Comm. Security, pages 62-73. ACM Press, 1993.
    • (1993) Proceedings of ACM Computer and Comm. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • EUROCRYPT 2000. Spriger-Verlag
    • F. Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 431-444. Spriger-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 9
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47:1423-1443, May 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 11
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia. in R. Anderson, editor
    • Information Hiding-First International Workshop. Springer-Verlag, May/June
    • I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In R. Anderson, editor, Information Hiding-First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 175-190. Springer-Verlag, May/June 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 175-190
    • Cox, I.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 12
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Proceedings of CRYPTO'94. Spriger-Verlag
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proceedings of CRYPTO'94, volume 839 of Lecture Notes in Computer Science, pages 174-187. Spriger-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 13
    • 35248829262 scopus 로고    scopus 로고
    • Zero-knowledge watermark detection
    • S. Craver. Zero-knowledge watermark detection. In Information Hiding, pages 101-116, 1999.
    • (1999) Information Hiding , pp. 101-116
    • Craver, S.1
  • 14
    • 1442310343 scopus 로고    scopus 로고
    • Commitment schemes and zero-knowledge protocols
    • Lectures on data security, Modern Cryptology in Theory and Practise. Springer-Verlag, July
    • I. Damgård. Commitment schemes and zero-knowledge protocols. In Lectures on data security, Modern Cryptology in Theory and Practise, volume 1561 of Lecture Notes in Comuter Science, pages 63-86. Springer-Verlag, July 1998.
    • (1998) Lecture Notes in Comuter Science , vol.1561 , pp. 63-86
    • Damgård, I.1
  • 15
    • 84958774556 scopus 로고    scopus 로고
    • A statistically-hiding integer commitment scheme based on groups with hidden order
    • ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. Spriger-Verlag, December
    • I. Damgård and E. Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, volume 2501 of Lecture Notes in Computer Science, pages 125-142. Spriger-Verlag, December 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 125-142
    • Damgård, I.1    Fujisaki, E.2
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In SIAM Journal of Computing, volume 18, pages 186-208, 1989.
    • (1989) SIAM Journal of Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 17
    • 0033882559 scopus 로고    scopus 로고
    • Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • January. Special Issue on Image and Video Processing for Digital Libraries
    • J. R. Hernández, M. Amado, and F. Pérez-González. Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1):55-68, January 2000. Special Issue on Image and Video Processing for Digital Libraries.
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.1 , pp. 55-68
    • Hernández, J.R.1    Amado, M.2    Pérez-González, F.3
  • 18
    • 0345058958 scopus 로고    scopus 로고
    • On diophantine complexity and statistical zero-knowledge arguments
    • ASIACRYPT 2003. Spriger-Verlag, November
    • H. Lipmaa. On diophantine complexity and statistical zero-knowledge arguments. In ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398-415. Spriger-Verlag, November 2003.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 398-415
    • Lipmaa, H.1
  • 19
    • 21844449699 scopus 로고    scopus 로고
    • Detection in quantization-based watermarking: Performance and security issues
    • E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, San José, USA, January
    • L. Pérez-Freire, P. Comesaña, and F. Pérez- González. Detection in quantization-based watermarking: performance and security issues. In E. J. D. III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681 of Proc. of SPIE, pages 721-733, San José, USA, January 2005.
    • (2005) Proc. of SPIE , vol.5681 , pp. 721-733
    • Pérez-Freire, L.1    Comesaña, P.2    Pérez-González, F.3
  • 20
    • 0038188753 scopus 로고    scopus 로고
    • Performance analysis of existing and new methods for data hiding with known-host information in additive channels
    • April
    • F. Pérez-González, F. Balado, and J. R. Hernández. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, 51:960-980, April 2003.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , pp. 960-980
    • Pérez-González, F.1    Balado, F.2    Hernández, J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.