Towards a secure and de-centralized digital watermarking infrastructure for the protection of intellectual property
- 624 Downloads
The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is the use of digital watermarking to embed additional copyright information within data. However, central servers or certification authorities are required by most current watermarking protocols, thus limiting the wide-spread application of watermarking in electronic commerce applications.
We propose a secure, distributed watermarking scheme using trusted, tamper-proof hardware. The protocols presented provide support for copyright protection and fingerprinting in a de-centralized fashion. Extensive use of a public-key infrastructure permits the secure exchange of secret keys between trusted devices. The unencrypted, private keys never leave the hardware, rendering them unrecoverable. If adopted, this allows for the establishment of a ubiquitous digital watermarking infrastructure to support and foster e-commerce applications.
Unable to display preview. Download preview PDF.
- 1.A. Adelsbach, B. Pfitzmann, A.-R. Sadeghi, “Proving Ownership of Digital Content” in Proc. of the Third Intl. Workshop on Information Hiding, LNCS 1768, 2000, pp. 117–133.Google Scholar
- 3.D. Bonch, J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, in Proc. of the CRYPTO’95, LNCS 963, 1995, pp. 452–465.Google Scholar
- 4.S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, “Can invisible watermarks resolve rightful ownership?”, in Proc. of the SPIE 3022, Storage and Retrieval for Image and Video Databases, 1997, pp. 310–321.Google Scholar
- 6.S. Craver, “Zero Knowledge Watermark Detection”, in Proc. of the Third International Workshop on Information Hiding, LNCS 1768, 2000, pp. 101–116.Google Scholar
- 7.S. Katzenbeisser, F.A.P. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Boston, London: Artech House, 2000.Google Scholar
- 8.M. Kutter, S. Voloshynovskiy, A. Herrigel, “The Watermark Copy Attack” in Proc. of the SPIE 3971, Security and Watermarking of Multimedia Contents II, 2000.Google Scholar
- 9.N. Memon, P. W. Wong, “Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System”, in Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents, 1999, pp. 289–294.Google Scholar
- 10.L. Qiao, K. Nahrstedt, Watermarking Schemes and Protocols For Protecting Rightful Ownerships and Customer’s Rights, Research report, Dept. of Computer Science, University of Illinois at Urbana-Champaign, 1997.Google Scholar
- 11.B. Schneier, DVD Encryption Broken, Crypto-Gram Newsletter 11/1999, available at http://www.counterpane.com/crypto-gram-9911.html.