{"id":"https://openalex.org/W2162517204","doi":"https://doi.org/10.1145/1161366.1161395","title":"Zero-knowledge watermark detection resistant to ambiguity attacks","display_name":"Zero-knowledge watermark detection resistant to ambiguity attacks","publication_year":2006,"publication_date":"2006-09-26","ids":{"openalex":"https://openalex.org/W2162517204","doi":"https://doi.org/10.1145/1161366.1161395","mag":"2162517204"},"language":"en","primary_location":{"id":"doi:10.1145/1161366.1161395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161366.1161395","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th workshop on Multimedia and security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100763663","display_name":"Qiming Li","orcid":"https://orcid.org/0000-0001-7289-0901"},"institutions":[{"id":"https://openalex.org/I4210120584","display_name":"Polytechnic University","ror":"https://ror.org/02f0psx94","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210120584"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Qiming Li","raw_affiliation_strings":["Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Polytechnic University","institution_ids":["https://openalex.org/I4210120584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100763663"],"corresponding_institution_ids":["https://openalex.org/I4210120584"],"apc_list":null,"apc_paid":null,"fwci":3.4772,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.93509245,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2939","issue":null,"first_page":"158","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9856388568878174},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8483331799507141},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.7882091403007507},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.7683146595954895},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7021015882492065},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821367740631104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6379088163375854},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.5810655951499939},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.4269472658634186},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.38732296228408813},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30694299936294556},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2333901822566986},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08826842904090881},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08526414632797241}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9856388568878174},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8483331799507141},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.7882091403007507},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.7683146595954895},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7021015882492065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821367740631104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6379088163375854},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.5810655951499939},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.4269472658634186},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.38732296228408813},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30694299936294556},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2333901822566986},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08826842904090881},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08526414632797241},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1161366.1161395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161366.1161395","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th workshop on Multimedia and security","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/41692","is_oa":false,"landing_page_url":"http://scholarbank.nus.edu.sg/handle/10635/41692","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus","raw_type":"Conference Paper"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.65.4165","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.4165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.comp.nus.edu.sg/~changec/publications/2006_MMSEC_WM.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W59904812","https://openalex.org/W172970726","https://openalex.org/W405534807","https://openalex.org/W1488102445","https://openalex.org/W1494775996","https://openalex.org/W1542998351","https://openalex.org/W1561877077","https://openalex.org/W1592132418","https://openalex.org/W1810933997","https://openalex.org/W1820925235","https://openalex.org/W1850675439","https://openalex.org/W1885156594","https://openalex.org/W1961759748","https://openalex.org/W1980651951","https://openalex.org/W2011860428","https://openalex.org/W2052267638","https://openalex.org/W2065764259","https://openalex.org/W2078566730","https://openalex.org/W2085759780","https://openalex.org/W2104826340","https://openalex.org/W2143261682","https://openalex.org/W2170436791","https://openalex.org/W2611745365","https://openalex.org/W3147008444","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"A":[0],"zero-knowledge":[1,146],"watermark":[2,21,39,41,51,69,98,114,147],"detector":[3,148],"allows":[4,161],"an":[5,13,87,91],"owner":[6,35,62,152,163],"to":[7,9,45,132,164],"prove":[8,64],"a":[10,32,37,96,100,113,145,166],"verifier":[11],"that":[12,47,60,65,149],"image":[14],"in":[15,74,119],"question":[16],"indeed":[17],"contains":[18],"the":[19,27,34,50,53,61,68,71,75,83,105,109,120,137,151,162],"owner's":[20],"without":[22],"revealing":[23],"much":[24],"information":[25],"about":[26],"actual":[28],"watermark.":[29,107],"In":[30,140,158],"such":[31],"scenario,":[33],"publishes":[36],"committed":[38],"before":[40,52,70],"detection":[42],"so":[43],"as":[44],"show":[46],"she":[48,66],"knows":[49,67],"detection.":[54],"However,":[55],"this":[56,141],"does":[57],"not":[58],"imply":[59],"can":[63,89],"work":[72],"appeared":[73],"public.":[76],"One":[77,129],"well":[78],"known":[79],"counter":[80],"example":[81],"is":[82,131],"invertibility/ambiguity":[84],"attacks":[85],"where":[86],"adversary":[88,110],"create":[90],"ambiguous":[92],"situation":[93],"by":[94,155],"deriving":[95],"forged":[97,106],"from":[99,115,153],"published":[101],"work,":[102],"and":[103,123],"commits":[104],"Furthermore,":[108],"may":[111],"derive":[112],"existing":[116],"non-watermarked":[117],"images":[118],"public":[121],"domain":[122],"later":[124],"claim":[125],"ownership":[126],"of":[127,169],"them.":[128],"solution":[130],"enforce":[133],"certain":[134],"constraints":[135],"on":[136],"valid":[138],"watermarks.":[139],"paper":[142],"we":[143],"propose":[144],"prevents":[150],"cheating":[154],"ambiguity":[156],"attacks.":[157],"addition,":[159],"it":[160],"publish":[165],"large":[167],"number":[168],"works":[170],"with":[171],"different":[172],"watermarks,":[173],"while":[174],"committing":[175],"only":[176],"one":[177],"secret.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
