Security models of digital watermarking

Qiming Li, Nasir Memon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

    Original languageEnglish (US)
    Title of host publicationMultimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings
    Pages60-64
    Number of pages5
    Volume4577 LNCS
    StatePublished - 2007
    EventInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007 - Weihai, China
    Duration: Jun 30 2007Jul 1 2007

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4577 LNCS
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    OtherInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007
    CountryChina
    CityWeihai
    Period6/30/077/1/07

    Fingerprint

    Digital watermarking
    Digital Watermarking
    Security Model
    Hand
    Watermarking
    Digital Rights Management
    Model
    Side Information
    Security Analysis
    Surveys and Questionnaires
    Direction compound
    Robustness
    Scenarios
    Communication

    ASJC Scopus subject areas

    • Computer Science(all)
    • Biochemistry, Genetics and Molecular Biology(all)
    • Theoretical Computer Science

    Cite this

    Li, Q., & Memon, N. (2007). Security models of digital watermarking. In Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings (Vol. 4577 LNCS, pp. 60-64). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4577 LNCS).

    Security models of digital watermarking. / Li, Qiming; Memon, Nasir.

    Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS 2007. p. 60-64 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4577 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Li, Q & Memon, N 2007, Security models of digital watermarking. in Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. vol. 4577 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4577 LNCS, pp. 60-64, International Workshop on Multimedia Content Analysis and Mining, MCAM 2007, Weihai, China, 6/30/07.
    Li Q, Memon N. Security models of digital watermarking. In Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS. 2007. p. 60-64. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    Li, Qiming ; Memon, Nasir. / Security models of digital watermarking. Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS 2007. pp. 60-64 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{60df28e519024478bc4251c24da12c04,
    title = "Security models of digital watermarking",
    abstract = "Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.",
    author = "Qiming Li and Nasir Memon",
    year = "2007",
    language = "English (US)",
    isbn = "9783540734161",
    volume = "4577 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    pages = "60--64",
    booktitle = "Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings",

    }

    TY - GEN

    T1 - Security models of digital watermarking

    AU - Li, Qiming

    AU - Memon, Nasir

    PY - 2007

    Y1 - 2007

    N2 - Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

    AB - Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

    UR - http://www.scopus.com/inward/record.url?scp=37249020381&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=37249020381&partnerID=8YFLogxK

    M3 - Conference contribution

    SN - 9783540734161

    VL - 4577 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 60

    EP - 64

    BT - Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings

    ER -