Security models of digital watermarking

Qiming Li, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

Original languageEnglish (US)
Title of host publicationMultimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings
Pages60-64
Number of pages5
Volume4577 LNCS
StatePublished - 2007
EventInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007 - Weihai, China
Duration: Jun 30 2007Jul 1 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4577 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007
CountryChina
CityWeihai
Period6/30/077/1/07

Fingerprint

Digital watermarking
Digital Watermarking
Security Model
Hand
Watermarking
Digital Rights Management
Model
Side Information
Security Analysis
Surveys and Questionnaires
Direction compound
Robustness
Scenarios
Communication

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Li, Q., & Memon, N. (2007). Security models of digital watermarking. In Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings (Vol. 4577 LNCS, pp. 60-64). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4577 LNCS).

Security models of digital watermarking. / Li, Qiming; Memon, Nasir.

Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS 2007. p. 60-64 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4577 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, Q & Memon, N 2007, Security models of digital watermarking. in Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. vol. 4577 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4577 LNCS, pp. 60-64, International Workshop on Multimedia Content Analysis and Mining, MCAM 2007, Weihai, China, 6/30/07.
Li Q, Memon N. Security models of digital watermarking. In Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS. 2007. p. 60-64. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Li, Qiming ; Memon, Nasir. / Security models of digital watermarking. Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Vol. 4577 LNCS 2007. pp. 60-64 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{60df28e519024478bc4251c24da12c04,
title = "Security models of digital watermarking",
abstract = "Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.",
author = "Qiming Li and Nasir Memon",
year = "2007",
language = "English (US)",
isbn = "9783540734161",
volume = "4577 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "60--64",
booktitle = "Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings",

}

TY - GEN

T1 - Security models of digital watermarking

AU - Li, Qiming

AU - Memon, Nasir

PY - 2007

Y1 - 2007

N2 - Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

AB - Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

UR - http://www.scopus.com/inward/record.url?scp=37249020381&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37249020381&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540734161

VL - 4577 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 60

EP - 64

BT - Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings

ER -