skip to main content
article
Free access

Secure multimedia authoring with dishonest collaborators

Published: 01 January 2004 Publication History

Abstract

Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, we consider the problem of protecting authors' intellectual property rights from insiders, such as collaborating authors and producers, who interact with the creative process before publication. We describe the weaknesses of standard proof-of-ownership watermarking approaches against dishonest insiders and propose several possible architectures for systems that avoid these weaknesses. We further show how these architectures can be adapted for fingerprinting in the presence of dishonest insiders.

References

[1]
{1} H. Guo and N. D. Georganas, "A novel approach to digital image watermarking based on a generalized secret sharing scheme," Multimedia Systems, vol. 9, no. 3, pp. 249-260, 2003.
[2]
{2} N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona, "On multiple watermarking," in Workshop on Security and Multimedia at ACM Multimedia, pp. 3-6, Ottawa, Ont, Canada, 2001.
[3]
{3} G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data. A state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000.
[4]
{4} Y. Goland, E. Whitehead, A. Faizi, S. Carter, and D. Jensen, HTTP extensions for distributed authoring - WEBDAV, RFC 2518, Internet Society, 1999.
[5]
{5} J. Fridrich, A. C. Baldoza, and R. Simard, "Robust digital watermarking based on key-dependent basis functions," in Proc. 2nd Information Hiding Workshop, pp. 143-157, Portland, Ore, USA, April 1998.
[6]
{6} J. Fridrich, "Key-dependent random image transforms and their applications in image watermarking," in International Conference on Imaging Science, Systems, and Technology, pp. 237-243, Las Vegas, Nev, USA, June 1999.
[7]
{7} J.-C. Yen, "Watermarks embedded in the permuted image," in Proc. IEEE International Symposium on Circuits and Systems, vol. 2, pp. 53-56, Sydney, Australia, May 2001.
[8]
{8} N. Memon and P. W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Processing, vol. 10, no. 4, pp. 643-649, 2001.
[9]
{9} R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, R. A. DeMillo, D. Dobkin, A. Jones, and R. Lipton, Eds., pp. 169-179, Academic Press, New York, NY, USA, 1978.
[10]
{10} R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[11]
{11} I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Proc. 1st International Workshop on Information Hiding, pp. 185-206, Cambridge, UK, 1996.
[12]
{12} W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.
[13]
{13} I. Pitas, "A method for signature casting on digital images," in Proc. IEEE International Conference on Image Processing, pp. 215-218, Lausanne, Switzerland, September 1996.
[14]
{14} G. Depovere and T. Kalker, "Secret key watermarking with changing keys," in IEEE International Conference on Image Processing, pp. 427-429, Vancouver, BC, Canada, September 2000.
[15]
{15} J. Stern and J.-P. Tillich, "Automatic detection of a watermarked document using a private key," in Proc. 4th International Workshop on Information Hiding, pp. 258-272, Pittsburgh, Pa, USA, April 2001.
[16]
{16} T. Kalker, G. Depovere, J. Haitsma, and M. Maes, "A video watermarking system for broadcast monitoring," in IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents , pp. 103-122, San Jose, Calif, USA, January 1999.
[17]
{17} F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," in IEEE International Conference on Image Processing, pp. 528-531, Santa Barbara, Calif, USA, October 1997.
[18]
{18} J. J. Eggers, J. K. Su, and B. Girod, "Asymmetric watermarking schemes," in Sicherheit in Netzen und Medienstr�men, M. Schumacher and R. Steinmetz, Eds., pp. 124-133, Berlin, Germany, 2000.
[19]
{19} M. Handley and J. Crowcroft, "Network Text Editor (NTE): a scalable shared text editor for the MBone," in Proc. ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 197-208, Cannes, France, September 1997.
[20]
{20} V. Solachidis, N. Nikolaidis, and I. Pitas, "Fourier descriptors watermarking of vector graphics images," in IEEE International Conference on Image Processing, pp. 9-12, Vancouver, BC, Canada, September 2000.
[21]
{21} B. Koh and T. Chen, "Progressive browsing of 3D models," in Proc. IEEE 3rd Workshop on Multimedia Signal Processing, pp. 71-76, Copenhagen, Denmark, September 1999.
[22]
{22} B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," in EUROCRYPT '96, pp. 84-95, Springer-Verlag, Berlin, Germany, 1996.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Advances in Signal Processing  Volume 2004, Issue
1 January 2004
2599 pages

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 01 January 2004

Author Tags

  1. collaboration
  2. digital watermarking
  3. fingerprinting
  4. multiple watermarking
  5. proof of ownership

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)2
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media