DocumentCode :
2240830
Title :
Is asymmetric watermarking necessary or sufficient?
Author :
Miller, Matt L.
Author_Institution :
NEC Res. Inst., Princeton, NJ, USA
fYear :
2002
fDate :
3-6 Sept. 2002
Firstpage :
1
Lastpage :
4
Abstract :
In public watermarking applications, the public must have the ability to detect watermarks, but must not have the ability to remove them. It has been proposed that such systems might be made secure by using asymmetric key watermarking, in which the embedder and detector use different keys. This paper asks whether asymmetric-key watermarking is sufficient and necessary for secure public watermarking applications. The answer found, both to the question of sufficiency and the question of necessity, is basically no. Asymmetric-key watermarking, by itself, is demonstrably insufficient, because there exist asymmetrickey watermarking systems that do not provide the required security. Asymmetric-key watermarking might not be necessary, because it is possible to imagine irreversible watermarking systems, in which even complete knowledge of the embedder would not help an adversary remove watermarks. The paper concludes by suggesting that research in secure public watermarking should focus on the design of the detector. The embedding algorithm, and whether it employs any information that must be kept secret, is of secondary concern.
Keywords :
embedded systems; watermarking; asymmetric key watermarking; embedding algorithm; irreversible watermarking system; secure public watermarking applications; watermark detection; Abstracts; Correlation; Detectors; Media; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing Conference, 2002 11th European
Conference_Location :
Toulouse
ISSN :
2219-5491
Type :
conf
Filename :
7072293
Link To Document :
بازگشت