Recently, researchers involved in the watermarking field concentrated their attention to the security aspects. In a watermarking application one of the most important phases from the point of view of security, is the watermark extraction process: a prover has to prove to a verifier that a given watermark is present into the content. In the design of the scheme, it has to be considered that the prover is not trusted, since could try to exploit the knowledge acquired during watermark extraction to attack the security of the watermarking system. To tackle this issue, a possible solution consists in using cryptographic tools, defined Zero-Knowledge protocols, for building a secure layer on top of the watermarking channel, able to protect the watermarking algorithm against a possible information leakage.

Cryptography and Data Hiding for Media Security / A. Piva. - STAMPA. - (2008), pp. 227-255.

Cryptography and Data Hiding for Media Security

PIVA, ALESSANDRO
2008

Abstract

Recently, researchers involved in the watermarking field concentrated their attention to the security aspects. In a watermarking application one of the most important phases from the point of view of security, is the watermark extraction process: a prover has to prove to a verifier that a given watermark is present into the content. In the design of the scheme, it has to be considered that the prover is not trusted, since could try to exploit the knowledge acquired during watermark extraction to attack the security of the watermarking system. To tackle this issue, a possible solution consists in using cryptographic tools, defined Zero-Knowledge protocols, for building a secure layer on top of the watermarking channel, able to protect the watermarking algorithm against a possible information leakage.
2008
Multimedia Interactive Services in Intelligent Environments
227
255
A. Piva
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/359948
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact