Resistance of digital watermarks to collusive attacks

Author(s):  
J. Kilian ◽  
F.T. Leighton ◽  
L.R. Matheson ◽  
T.G. Shamoon ◽  
R.E. Tarjan ◽  
...  
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


2021 ◽  
Vol 1901 (1) ◽  
pp. 012031
Author(s):  
S V Belim ◽  
S N Munko ◽  
S Yu Belim

2013 ◽  
Vol 42 (4) ◽  
pp. 204-208
Author(s):  
Jack Scott

AbstractLibraries today face the same challenges that they always have faced, but with the additional dimension that the world of computers engenders. Policies and practices have been developed for deterring theft and for recovering stolen library materials in the analog world, but we are in an incunabula period for doing the same for digital documents-images and pictorial and sound materials. One means of protection for both kinds of materials is marking them indelibly. This can be done in a variety of ways for physical materials, but there is a new world of electronic marking that is in its infancy. This practice, called Steganography, creates digital watermarks that can be hidden, but they may also be detected and erased. This essay discusses attempts to create digital watermarks that resist tampering with.


Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


Author(s):  
Tino Jahnke ◽  
Juergen Seitz

In order to solve intellectual property problems of the digital age, two basic procedures are used: “Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful right protection mechanisms. Digital watermarks are mostly inserted as a plain bit sample or a transformed digital signal into the source data using a key based embedding algorithm and a pseudo-noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology a trade-off has to be made between competing criteria like robustness, non-perceptibility, non-delectability, and security. Most watermarking algorithms are resistant against selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can destroy easily the watermark or falsify it. This chapter gives an overview in watermarking technologies, classification, methodology, applications and problems.


Author(s):  
Kuanchin Chen

Digital representation of data is becoming popular as technology improves our ways of information dissemination, sharing and presentation. Without careful planning, digitized resources could easily be misused, especially those distributed broadly over the Internet. Examples of such misuse include use without owner’s permission and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of authentication mechanism, such as digital watermarks.


2001 ◽  
Vol 48 (5) ◽  
pp. 875-882 ◽  
Author(s):  
Ming-Shing Hsieh ◽  
Din-Chang Tseng ◽  
Yong-Huai Huang

Sign in / Sign up

Export Citation Format

Share Document