Skip to main content

Towards a secure and de-centralized digital watermarking infrastructure for the protection of intellectual property

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1875))

Abstract

The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is the use of digital watermarking to embed additional copyright information within data. However, central servers or certification authorities are required by most current watermarking protocols, thus limiting the wide-spread application of watermarking in electronic commerce applications.

We propose a secure, distributed watermarking scheme using trusted, tamper-proof hardware. The protocols presented provide support for copyright protection and fingerprinting in a de-centralized fashion. Extensive use of a public-key infrastructure permits the secure exchange of secret keys between trusted devices. The unencrypted, private keys never leave the hardware, rendering them unrecoverable. If adopted, this allows for the establishment of a ubiquitous digital watermarking infrastructure to support and foster e-commerce applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Adelsbach, B. Pfitzmann, A.-R. Sadeghi, “Proving Ownership of Digital Content” in Proc. of the Third Intl. Workshop on Information Hiding, LNCS 1768, 2000, pp. 117–133.

    Google Scholar 

  2. J. A. Bloom, I. J. Cox, et. al., “Copy Protection for DVD Video”, in Proc. of the IEEE, vol. 87, no. 7, July 1999, pp. 1267–1276.

    Article  Google Scholar 

  3. D. Bonch, J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, in Proc. of the CRYPTO’95, LNCS 963, 1995, pp. 452–465.

    Google Scholar 

  4. S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, “Can invisible watermarks resolve rightful ownership?”, in Proc. of the SPIE 3022, Storage and Retrieval for Image and Video Databases, 1997, pp. 310–321.

    Google Scholar 

  5. S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications”, in IEEE Journal on Selected Areas in Communications, vol. 16. no. 4, 1998, pp. 573–586.

    Article  Google Scholar 

  6. S. Craver, “Zero Knowledge Watermark Detection”, in Proc. of the Third International Workshop on Information Hiding, LNCS 1768, 2000, pp. 101–116.

    Google Scholar 

  7. S. Katzenbeisser, F.A.P. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Boston, London: Artech House, 2000.

    Google Scholar 

  8. M. Kutter, S. Voloshynovskiy, A. Herrigel, “The Watermark Copy Attack” in Proc. of the SPIE 3971, Security and Watermarking of Multimedia Contents II, 2000.

    Google Scholar 

  9. N. Memon, P. W. Wong, “Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System”, in Proceedings of the SPIE 3657, Security and Watermarking of Multimedia Contents, 1999, pp. 289–294.

    Google Scholar 

  10. L. Qiao, K. Nahrstedt, Watermarking Schemes and Protocols For Protecting Rightful Ownerships and Customer’s Rights, Research report, Dept. of Computer Science, University of Illinois at Urbana-Champaign, 1997.

    Google Scholar 

  11. B. Schneier, DVD Encryption Broken, Crypto-Gram Newsletter 11/1999, available at http://www.counterpane.com/crypto-gram-9911.html.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tomsich, P., Katzenbeisser, S. (2000). Towards a secure and de-centralized digital watermarking infrastructure for the protection of intellectual property. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds) Electronic Commerce and Web Technologies. EC-Web 2000. Lecture Notes in Computer Science, vol 1875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44463-7_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-44463-7_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67981-3

  • Online ISBN: 978-3-540-44463-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics