{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:05Z","timestamp":1774539245085,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,26]]},"DOI":"10.1145\/1161366.1161395","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T18:04:00Z","timestamp":1161194640000},"page":"158-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Zero-knowledge watermark detection resistant to ambiguity attacks"],"prefix":"10.1145","author":[{"given":"Qiming","family":"Li","sequence":"first","affiliation":[{"name":"Polytechnic University"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2006,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/947380.947395"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-540-24624-4_27","volume-title":"International Workshop on Digital Watermarking","volume":"2939","author":"Adelsbach A.","year":"2003","unstructured":"A. Adelsbach , S. Katzenbeisser , and A. Sadeghi . On the insecurity of non-invertible watermarking schemes for dispute resolving . In International Workshop on Digital Watermarking , volume 2939 of LNCS, pages 355 -- 369 , October 2003 . A. Adelsbach, S. Katzenbeisser, and A. Sadeghi. On the insecurity of non-invertible watermarking schemes for dispute resolving. In International Workshop on Digital Watermarking, volume 2939 of LNCS, pages 355--369, October 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731873"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"431","volume-title":"EUROCRYPT","author":"Boudot Fabrice","year":"2000","unstructured":"Fabrice Boudot . Efficient proofs that a committed number lies in an interval . In EUROCRYPT , volume 1807 of LNCS , pages 431 -- 444 , 2000 . Fabrice Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT, volume 1807 of LNCS, pages 431--444, 2000."},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"106","volume-title":"EUROCRYPT","author":"Camenisch Jan","year":"1999","unstructured":"Jan Camenisch and Markus Michels . Proving in zero-knowledge that a number is the product of two safe primes . In EUROCRYPT , volume 1592 of LNCS , pages 106 -- 121 , Prague , Czech Republic , May 1999 . Jan Camenisch and Markus Michels. Proving in zero-knowledge that a number is the product of two safe primes. In EUROCRYPT, volume 1592 of LNCS, pages 106--121, Prague, Czech Republic, May 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/502983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/647596.731701"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"125","volume-title":"ASIACRYPT","author":"Damgard I.","year":"2002","unstructured":"I. Damgard and E. Fujisaki . A statistically-hiding integer commitment scheme based on groups with hidden order . In ASIACRYPT , volume 2501 of LNCS , pages 125 -- 142 , Queenstown , New Zealand , December 2002 . I. Damgard and E. Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order. In ASIACRYPT, volume 2501 of LNCS, pages 125--142, Queenstown, New Zealand, December 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58346-9_11"},{"key":"e_1_3_2_1_13_1","volume-title":"European Signal Processing Conference","author":"Eggers J.J.","year":"2000","unstructured":"J.J. Eggers , J.K Su , and B. Girod . Public key watermarking by eigenvectors of linear transforms . In European Signal Processing Conference , Tampere, Finland , September 2000 . J.J. Eggers, J.K Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. In European Signal Processing Conference, Tampere, Finland, September 2000."},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"16","volume-title":"Crypto","author":"Fujisaki E.","year":"1994","unstructured":"E. Fujisaki and T. Okamoto . Statistical zero knowledge protocols to prove modular polynomial relations . In Crypto , volume 839 of LNCS , pages 16 -- 30 , Santa Barbara , California, USA , August 1994 . E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Crypto, volume 839 of LNCS, pages 16--30, Santa Barbara, California, USA, August 1994."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647596.731715"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1007\/978-3-540-24624-4_45","volume-title":"International Workshop on Digital Watermarking","volume":"2939","author":"Li Q.","year":"2003","unstructured":"Q. Li and E.-C. Chang . Public watermark detection using multiple proxies and secret sharing . In International Workshop on Digital Watermarking , volume 2939 of LNCS, pages 558 -- 569 , Seoul, Korea , October 2003 . Q. Li and E.-C. Chang. Public watermark detection using multiple proxies and secret sharing. In International Workshop on Digital Watermarking, volume 2939 of LNCS, pages 558--569, Seoul, Korea, October 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.344679"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"T.P.\n      Pedersen\n    .\n  Non-interactive and information-theoretic secure verifiable secret sharing\n  . In J. Feigenbaum editor CRYPTO volume \n  576\n   of \n  LNCS pages \n  129\n  --\n  140 Santa Barbara California USA August \n  1992\n  .   T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum editor CRYPTO volume 576 of LNCS pages 129--140 Santa Barbara California USA August 1992.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1998.0391"},{"key":"e_1_3_2_1_21_1","first-page":"102","volume-title":"Symposium on Content Security and Data Hiding in Digital Media","author":"Ramkumar M.","year":"1999","unstructured":"M. Ramkumar and A. Akansu . Image watermarks and counterfeit attacks: Some problems and solutions . In Symposium on Content Security and Data Hiding in Digital Media , pages 102 -- 112 , New Jersey Institute of Technology , May 1999 . M. Ramkumar and A. Akansu. Image watermarks and counterfeit attacks: Some problems and solutions. In Symposium on Content Security and Data Hiding in Digital Media, pages 102--112, New Jersey Institute of Technology, May 1999."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779265"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073190"}],"event":{"name":"MM&Sec '06: Multimedia and Security Workshop","location":"Geneva Switzerland","acronym":"MM&Sec '06","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 8th workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161366.1161395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T21:36:13Z","timestamp":1673040973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161366.1161395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,26]]},"references-count":23,"alternative-id":["10.1145\/1161366.1161395","10.1145\/1161366"],"URL":"https:\/\/doi.org\/10.1145\/1161366.1161395","relation":{},"subject":[],"published":{"date-parts":[[2006,9,26]]},"assertion":[{"value":"2006-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}