Advertisement

Intellectual Property Protection Systems and Digital Watermarking

  • Jack Lacy
  • Schuyler R. Quackenbush
  • Amy Reibman
  • James H. Snyder
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

Adequate protection of digital copies of multimedia content - both audio and video — is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining highfidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.

Keywords

Multimedia Content Compression Algorithm Digital Watermark Watermark Algorithm Audio Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, “ISO/IEC MPEG-2 Advanced Audio Coding”, presented at the 101st Convention of the Audio Engineering Society, Nov. 1996, preprint 4382.Google Scholar
  2. 2.
    D. Aucsmith, “Tamper Resistant Software”, in Proceedings of the First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 317–334.CrossRefGoogle Scholar
  3. 3.
    M. Blaze, J. Feigenbaum, J. Lacy, “Decentralized Trust Management”, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173.Google Scholar
  4. 4.
    D. Boneh, J. Shaw, “Collusion-secure Fingerprinting for Digital Data”, Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, pp. 452–465Google Scholar
  5. 5.
    I. J. Cox and J.M.G. Linnartz, “Public Watermarks and Resistance to Tampering”, Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.Google Scholar
  6. 6.
    U.S. National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standards Publication, FIPS PUB 46-1, Jan. 1988.Google Scholar
  7. 7.
    F. Hartung and B. Girod, “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain”, Proc. IEEE ICASSP, pp. 2621–4, April 1997.Google Scholar
  8. 8.
    “Cryptolope Container Technology”, an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.
  9. 9.
    Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.Google Scholar
  10. 10.
    International Federation of the Phonograph Industry, Request for Proposals-Embedded signaling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.Google Scholar
  11. 11.
    Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 207–226.Google Scholar
  12. 12.
    J. Lacy, D. P. Maher, and J. H. Snyder, “Music on the Internet and the Intellectual Property Protection Problem”, Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July 1997.Google Scholar
  13. 13.
    J. Lacy, S.R. Quackenbush, A.R. Reibman, D. Shur, J.H. Snyder, “On Combining Watermarking with Perceptual Coding”, submitted to Proc. IEEE ICASSP, 1998.Google Scholar
  14. 14.
    MPEG video committee, “Test Model 5”, ISO-IEC/JTC1/SC29/WG11 N0400, April 1993.Google Scholar
  15. 15.
    F. Petitcolas, R. Anderson, M. Kuhn, “Attacks on Copyright Marking Systems”, Second Information Hiding Workshop, 1998.Google Scholar
  16. 16.
    O. Sibert, D. Bernstein, D. VanWie, “Securing the Content, Not the Wire, for Information Commerce”Google Scholar
  17. 17.
    J. Smith, B. Comisky, “Modulation and Information Hiding in Images”, Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 207–226.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Jack Lacy
    • 1
    • 2
  • Schuyler R. Quackenbush
    • 1
    • 2
  • Amy Reibman
    • 1
    • 2
  • James H. Snyder
    • 1
  1. 1.AT&T Labs — ResearchFlorham Park
  2. 2.AT&T Labs — ResearchRed Bank

Personalised recommendations