Watermarking...
Hi all, I was wondering if any of you have some pointers on the security of watermarking. In particular I am interested in public-key or asymmetric watermarking algorithms. Also, do you know of any free-to-use (opensource/etc.) implementation that can be used for research-test purposes ? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept Home Phone: +1 (603) 369-9332 PKI/Trust Laboratory Work Phone: +1 (603) 646-8734 --o People who think they know everything are a great annoyance to those of us who do. -- Isaac Asimov - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
Re: Watermarking...
On Tue, Apr 20, 2010 at 12:29 AM, Massimiliano Pala p...@cs.dartmouth.edu wrote: Hi all, I was wondering if any of you have some pointers on the security of watermarking. In particular I am interested in public-key or asymmetric watermarking algorithms. Ciao Massimiliano, You might be interesting in checking out the deliverables of BOWS contests at: http://bows2.gipsa-lab.inpg.fr/ and http://lci.det.unifi.it/BOWS/ Also, do you know of any free-to-use (opensource/etc.) implementation that can be used for research-test purposes ? -- Best Regards, Massimiliano Pala From a cursory look at bookmarks... - Peter Meerwald's implementation of digital image watermarking algorithms. - Microsoft Audio Watermarking Tool http://research.microsoft.com/en-us/downloads/885bb5c4-ae6d-418b-97f9-adc9da8d48bd/default.aspx Cheers, alfonso -- http://crypto.lo.gy - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
Re: Watermarking...
[Moderator's note: Please no top posting. --Perry] Hello Sandy, all, basically what I need is a library that will allow me to check for a watermark into an image/video/etc. It could be different algorithms for different media type - my work is not related to the algorithms themselves. The important issues are: * the algorithm(s) should be based on public key (asymmetric) * my program should be able to verify that a watermark exists and has been generated with a private key corresponding to a specific public key * an attacker should not be able to add a watermark that my app would recognize as valid (ie., the verification would fail when using my app's public key if an attacker tries to substitute the watermark) * if the watermark is removed/altered/substituted I should be able to detect it * the watermark should be invisible Do you know if/where can I find some libraries that provides me with some implementation of one or more algorithms that satisfy my needs ? I know there are a lot of publications about these algorithms, but I need a usable (also if not perfect) implementation.. preferably written in C/C++ Cheers, Max On 04/20/2010 09:49 AM, Sandy Harris wrote: What are your threat model and goals for the watermarking? Some watermarks -- like the photographer's copyright notice across a web picture -- are designed to be extremely visible. The whole idea is that if anyone steals the photo, everyone will know. For other threats, you might want a watermark to be completely invisible, perhaps even undetectable without some sort of key. Does it need to be tamper-resistant or unremovable? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept Home Phone: +1 (603) 369-9332 PKI/Trust Laboratory Work Phone: +1 (603) 646-8734 --o People who think they know everything are a great annoyance to those of us who do. -- Isaac Asimov - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
Re: Watermarking...
On 19 Apr 2010, at 23:29, Massimiliano Pala wrote: Hi all, I was wondering if any of you have some pointers on the security of watermarking. In particular I am interested in public-key or asymmetric watermarking algorithms. Also, do you know of any free-to-use (opensource/etc.) implementation that can be used for research-test purposes ? I found: http://techrepublic.com.com/1324-4-55.html PKI based Semi-Fragile Watermark for Visual Content Authentication Chamidu Atupelage, Koichi Harada, Member, ACM of use and easily hacked up. Dw - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com