Abstract. Multimedia applications deploy various cryptographic and watermarking techniques to maintain security. In this context, we survey the main work on two promising approaches for the secure embedding and detection of a watermark in an untrusted environment, and we point out some associated challenges.In the former case we consider Zero-Knowledge Watermark Detection (ZKWMD) that allows a legitimate party to prove to a potentially untrusted verifying party that a watermark is detectable in certain content, without jeopardizing the security of the watermark. ZKWMD protocols are useful primitives for direct proofs of authorship (i.e., without online involvement of a trusted third party) and dispute resolving in distributed systems. In the latter case we consider a Chameleon-like stream cipher that achieves simultaneous decryption and fingerprinting of data, and can serve as the second line of defense for tracing illegal distribution of broadcast messages, termed as Fingercasting.
MotivationCopyright protection is a significant prerequisite for intellectual achievements and the creation of original works. In addition to the legal framework that has protected authors since the early ages of book printing, technical measures have become paramount in the age of information technology.Today, various technologies are combined to maintain multimedia security. Core technologies in this context are digital watermarking and cryptography. Many proposals for protecting digital works against misuse and illegal distribution apply robust watermarking methods as basic building blocks. Robust watermarking methods embed additional information, called watermark, into digital content in such a way that this information can be detected, even after the content has been manipulated. Ideally, the robustness property of the watermarking method should guarantee that the watermark cannot be removed without destroying the digital content. Moreover, cryptographic methods, primitives, and protocols are deployed for conditional access allowing the protection of digital content and the restriction of access to legitimate users.