Team for Research in
Ubiquitous Secure Technology

From Weak to Strong Watermarking
Hopper Nicholas, David A Molnar, David Wagner

Citation
Hopper Nicholas, David A Molnar, David Wagner. "From Weak to Strong Watermarking". Theory of Cryptography Conference, International Association for Cryptologic Research, 2007.

Abstract
The informal goal of a watermarking scheme is to ``mark'' a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.

Electronic downloads

Citation formats  
  • HTML
    Hopper Nicholas, David A Molnar, David Wagner. <a
    href="http://www.truststc.org/pubs/500.html"
    >From Weak to Strong Watermarking</a>, Theory of
    Cryptography Conference, International Association for
    Cryptologic Research, 2007.
  • Plain text
    Hopper Nicholas, David A Molnar, David Wagner. "From
    Weak to Strong Watermarking". Theory of Cryptography
    Conference, International Association for Cryptologic
    Research, 2007.
  • BibTeX
    @inproceedings{NicholasMolnarWagner07_FromWeakToStrongWatermarking,
        author = {Hopper Nicholas and David A Molnar and David Wagner},
        title = {From Weak to Strong Watermarking},
        booktitle = {Theory of Cryptography Conference},
        organization = {International Association for Cryptologic Research},
        year = {2007},
        abstract = {The informal goal of a watermarking scheme is to
                  ``mark'' a digital object, such as a picture or
                  video, in such a way that it is difficult for an
                  adversary to remove the mark without destroying
                  the content of the object. Although there has been
                  considerable work proposing and breaking
                  watermarking schemes, there has been little
                  attention given to the formal security goals of
                  such a scheme. In this work, we provide a new
                  complexity-theoretic definition of security for
                  watermarking schemes. We describe some
                  shortcomings of previous attempts at defining
                  watermarking security, and show that security
                  under our definition also implies security under
                  previous definitions. We also propose two weaker
                  security conditions that seem to capture the
                  security goals of practice-oriented work on
                  watermarking and show how schemes satisfying these
                  weaker goals can be strengthened to satisfy our
                  definition. },
        URL = {http://www.truststc.org/pubs/500.html}
    }
    

Posted by David A Molnar on 28 Jan 2009.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.