Security models of digital watermarking

Qiming Li, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Digital watermarking, traditionally modeled as communication with side information, is generally considered to have important potential applications in various scenarios such as digital rights managements. However, the current literature mainly focuses on robustness, capacity and imperceptibility. There lacks systematic formal approach in tackling secure issues of watermarking. One one hand, the threat models in many previous works are not sufficiently established, which result in somewhat superficial or even flawed security analysis. On the other hand, there lacks a rigorous model for watermarking in general that allows useful analysis in practice. There has been some efforts in clearing the threat models and formulate rigorous watermarking models. However, there are also many other cases where security issues are lightly or incorrectly treated. In this paper, we survey various security notions and models in previous work, and discuss possible future research directions.

Original languageEnglish (US)
Title of host publicationMultimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings
PublisherSpringer Verlag
Pages60-64
Number of pages5
ISBN (Print)9783540734161
DOIs
StatePublished - 2007
EventInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007 - Weihai, China
Duration: Jun 30 2007Jul 1 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4577 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Workshop on Multimedia Content Analysis and Mining, MCAM 2007
CountryChina
CityWeihai
Period6/30/077/1/07

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security models of digital watermarking'. Together they form a unique fingerprint.

Cite this