메뉴 건너뛰기




Volumn 4300 LNCS, Issue , 2006, Pages 73-103

Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data

Author keywords

Detection; Implementation; Watermark; Zero knowledge

Indexed keywords

DIGITAL WATERMARKING; MULTIMEDIA SYSTEMS; SECURITY OF DATA; THEOREM PROVING;

EID: 38549144622     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11926214_3     Document Type: Conference Paper
Times cited : (2)

References (33)
  • 2
    • 0242581588 scopus 로고    scopus 로고
    • Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In Delp, E.J., Wong, P.W., eds.: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents. 5020., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE) (2003) 677-688
    • Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In Delp, E.J., Wong, P.W., eds.: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents. Volume 5020., The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE) (2003) 677-688
  • 4
    • 84944404911 scopus 로고    scopus 로고
    • Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, IHW 2001. 2137 of LNCS., Springer, Germany (2001) 273-288
    • Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, IHW 2001. Volume 2137 of LNCS., Springer, Germany (2001) 273-288
  • 8
    • 0032688251 scopus 로고    scopus 로고
    • Statistical analysis of watermarking schemes for copyright protection of images
    • Hernandez, J., Perez-Gonzales, F.: Statistical analysis of watermarking schemes for copyright protection of images. In: Proceedings of the IEEE. Volume 87. (1999) 1142-1166
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1142-1166
    • Hernandez, J.1    Perez-Gonzales, F.2
  • 9
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • Information Hiding, First International Workshop, IH'96. of, Springer Verlag
    • Cox, I., Kilián, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Information Hiding - First International Workshop, IH'96. Volume 1174 of LNCS., Springer Verlag (1996) 175-190
    • (1996) LNCS , vol.1174 , pp. 175-190
    • Cox, I.1    Kilián, J.2    Leighton, T.3    Shamoon, T.4
  • 12
    • 33646128241 scopus 로고    scopus 로고
    • Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. In Dittmann, J., Katzenbeisser, S., Uhl, A., eds.: CMS 2005. 3677 of LNCS., Springer (2005) 129-139
    • Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. In Dittmann, J., Katzenbeisser, S., Uhl, A., eds.: CMS 2005. Volume 3677 of LNCS., Springer (2005) 129-139
  • 13
    • 35048902439 scopus 로고    scopus 로고
    • An implementation of, and attacks on, zeroknowledge watermarking
    • Friedrich, J, ed, Information Hiding-6th International Workshop, IHW, of, Springer Verlag
    • Craver, S., Liu, B., Wolf, W.: An implementation of, and attacks on, zeroknowledge watermarking. In Friedrich, J., ed.: Information Hiding-6th International Workshop, IHW 2004. Volume 3200 of LNCS., Springer Verlag (2004) 1-12
    • (2004) LNCS , vol.3200 , pp. 1-12
    • Craver, S.1    Liu, B.2    Wolf, W.3
  • 14
    • 1442310343 scopus 로고    scopus 로고
    • Commitment schemes and zero-knowledge protocols
    • Damgård, I, ed, Lectures on data security: modern cryptology in theory and practise. of, Springer Verlag
    • Damgård, I.: Commitment schemes and zero-knowledge protocols. In Damgård, I., ed.: Lectures on data security: modern cryptology in theory and practise. Volume 1561 of LNCS. Springer Verlag (1998) 63-86
    • (1998) LNCS , vol.1561 , pp. 63-86
    • Damgård, I.1
  • 15
    • 38549147291 scopus 로고    scopus 로고
    • Master's thesis, Delft University of Technology and Philips Research Laboratories, Eindhoven
    • Jin, Y.: Zero knowledge watermark detection. Master's thesis, Delft University of Technology and Philips Research Laboratories, Eindhoven (2004)
    • (2004) Zero knowledge watermark detection
    • Jin, Y.1
  • 16
    • 0031354216 scopus 로고    scopus 로고
    • Dct-based watermark recovering without resorting to the uncorrupted original image
    • Santa Barbara, CA, USA, IEEE
    • Piva, A., Barni, M., Bartolini, F., Cappellini, V.: Dct-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of ICIP97. Volume I., Santa Barbara, CA, USA, IEEE (1997) 520-523
    • (1997) Proceedings of ICIP97 , vol.1 , pp. 520-523
    • Piva, A.1    Barni, M.2    Bartolini, F.3    Cappellini, V.4
  • 18
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • Aucsmith, D, ed, Information Hiding-Second International Workshop, IH'98. of, Portland Oregon, USA, Springer Verlag
    • Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith, D., ed.: Information Hiding-Second International Workshop, IH'98. Volume 1525 of LNCS., Portland Oregon, USA, Springer Verlag (1998) 258-272
    • (1998) LNCS , vol.1525 , pp. 258-272
    • Linnartz, J.P.M.G.1    van Dijk, M.2
  • 19
    • 33646182640 scopus 로고    scopus 로고
    • The return of the sensitivity attack
    • Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Digital Watermarking: 4th International Workshop, IWDW, of, Springer
    • Comesaña, P., Pérez-Freire, L., Pérez- González, F.: The return of the sensitivity attack. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Digital Watermarking: 4th International Workshop, IWDW 2005. Volume 3710 of Lecture Notes in Computer Science., Springer (2005) 260-274
    • (2005) Lecture Notes in Computer Science , vol.3710 , pp. 260-274
    • Comesaña, P.1    Pérez-Freire, L.2    Pérez- González, F.3
  • 20
    • 21844452953 scopus 로고    scopus 로고
    • Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In Delp, E.J., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents. 5681 of Proceedings of SPIE., SPIE (2005) 734-745
    • Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In Delp, E.J., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents. Volume 5681 of Proceedings of SPIE., SPIE (2005) 734-745
  • 22
    • 84958774556 scopus 로고    scopus 로고
    • Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT. 2501 of LNCS., Springer (2002) 125-142
    • Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT. Volume 2501 of LNCS., Springer (2002) 125-142
  • 23
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Advances in Cryptology, EUROCRYPT, of, Springer Verlag
    • Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Advances in Cryptology - EUROCRYPT '2000. Volume 1807 of LNCS., Springer Verlag (2000) 431-444
    • (2000) LNCS , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 24
    • 0345058958 scopus 로고    scopus 로고
    • Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: ASIACRYPT. 2894 of LNCS., Springer (2003) 398-415
    • Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: ASIACRYPT. Volume 2894 of LNCS., Springer (2003) 398-415
  • 25
    • 38549147296 scopus 로고    scopus 로고
    • Lagrange, J.L.: Démonstration d'un Théorème d'Arithmétique. Nouveaux Mémoires de l'Académie royale des Sciences et Belles-Lettres de Berlin (1770) 123-
    • Lagrange, J.L.: Démonstration d'un Théorème d'Arithmétique. Nouveaux Mémoires de l'Académie royale des Sciences et Belles-Lettres de Berlin (1770) 123-
  • 26
    • 38549142196 scopus 로고    scopus 로고
    • Lagrange, J.L. In: Oeuvres de Lagrange. III. Gauthier-Villars (1869) 189-201
    • Lagrange, J.L. In: Oeuvres de Lagrange. Volume III. Gauthier-Villars (1869) 189-201
  • 27
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the ACM CCS, ACM Press (1993) 62-73
    • (1993) Proceedings of the ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 28
    • 84990587369 scopus 로고    scopus 로고
    • Rabin, M.O., Shallit, J.O.: Randomized Algorithms in Number Theory. Communications on Pure and Applied Mathematics 39 (1986) S 239- S 256
    • Rabin, M.O., Shallit, J.O.: Randomized Algorithms in Number Theory. Communications on Pure and Applied Mathematics 39 (1986) S 239- S 256
  • 31
    • 0012085074 scopus 로고    scopus 로고
    • Information Hiding - 3rd International Workshop, IH'99
    • Pfitzmann, A, ed, of, Dresden, Germany, Springer Verlag
    • Pfitzmann, A., ed.: Information Hiding - 3rd International Workshop, IH'99. Volume 1768 of LNCS., Dresden, Germany, Springer Verlag (2000)
    • (2000) LNCS , vol.1768
  • 32
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smarte cards
    • Brassard, G, ed, Advances in Cryptology, CRYPTO. of, Springer
    • Schnorr, C.P.: Efficient identification and signatures for smarte cards. In Brassard, G., ed.: Advances in Cryptology - CRYPTO. Volume 435 of Lecture Notes in Computer Science., Springer (1989) 20-24
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 20-24
    • Schnorr, C.P.1
  • 33
    • 84957796827 scopus 로고    scopus 로고
    • Short proofs of knowledge for factoring
    • Imai, H, Zheng, Y, eds, Public Key Cryptography. of, Springer
    • Poupard, G., Stern, J.: Short proofs of knowledge for factoring. In Imai, H., Zheng, Y., eds.: Public Key Cryptography. Volume 1751 of Lecture Notes in Computer Science., Springer (2000) 147-166
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 147-166
    • Poupard, G.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.