Protocols for watermark verification

K. Gopalakrishnan, Nasir Memon, Poorvi L. Vora

    Research output: Contribution to journalArticle

    Abstract

    In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it.

    Original languageEnglish (US)
    Pages (from-to)66-70
    Number of pages5
    JournalIEEE Multimedia
    Volume8
    Issue number4
    DOIs
    StatePublished - Oct 2001

    Fingerprint

    Digital watermarking
    Watermark
    Network protocols
    Digital Watermarking
    Cryptographic Protocols
    Multimedia
    Eliminate
    Demonstrate

    ASJC Scopus subject areas

    • Hardware and Architecture
    • Information Systems
    • Computer Graphics and Computer-Aided Design
    • Software
    • Theoretical Computer Science
    • Computational Theory and Mathematics

    Cite this

    Gopalakrishnan, K., Memon, N., & Vora, P. L. (2001). Protocols for watermark verification. IEEE Multimedia, 8(4), 66-70. https://doi.org/10.1109/93.959104

    Protocols for watermark verification. / Gopalakrishnan, K.; Memon, Nasir; Vora, Poorvi L.

    In: IEEE Multimedia, Vol. 8, No. 4, 10.2001, p. 66-70.

    Research output: Contribution to journalArticle

    Gopalakrishnan, K, Memon, N & Vora, PL 2001, 'Protocols for watermark verification', IEEE Multimedia, vol. 8, no. 4, pp. 66-70. https://doi.org/10.1109/93.959104
    Gopalakrishnan K, Memon N, Vora PL. Protocols for watermark verification. IEEE Multimedia. 2001 Oct;8(4):66-70. https://doi.org/10.1109/93.959104
    Gopalakrishnan, K. ; Memon, Nasir ; Vora, Poorvi L. / Protocols for watermark verification. In: IEEE Multimedia. 2001 ; Vol. 8, No. 4. pp. 66-70.
    @article{6499f7cc53cf476da25941e3af1fafca,
    title = "Protocols for watermark verification",
    abstract = "In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it.",
    author = "K. Gopalakrishnan and Nasir Memon and Vora, {Poorvi L.}",
    year = "2001",
    month = "10",
    doi = "10.1109/93.959104",
    language = "English (US)",
    volume = "8",
    pages = "66--70",
    journal = "IEEE Multimedia",
    issn = "1070-986X",
    publisher = "IEEE Computer Society",
    number = "4",

    }

    TY - JOUR

    T1 - Protocols for watermark verification

    AU - Gopalakrishnan, K.

    AU - Memon, Nasir

    AU - Vora, Poorvi L.

    PY - 2001/10

    Y1 - 2001/10

    N2 - In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it.

    AB - In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using cryptographic protocols to demonstrate the presence of a watermark without revealing it.

    UR - http://www.scopus.com/inward/record.url?scp=0035472066&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=0035472066&partnerID=8YFLogxK

    U2 - 10.1109/93.959104

    DO - 10.1109/93.959104

    M3 - Article

    VL - 8

    SP - 66

    EP - 70

    JO - IEEE Multimedia

    JF - IEEE Multimedia

    SN - 1070-986X

    IS - 4

    ER -