Intellectual Property Protection Systems and Digital Watermarking
Adequate protection of digital copies of multimedia content - both audio and video — is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining highfidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.
KeywordsMultimedia Content Compression Algorithm Digital Watermark Watermark Algorithm Audio Watermark
Unable to display preview. Download preview PDF.
- 1.M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, “ISO/IEC MPEG-2 Advanced Audio Coding”, presented at the 101st Convention of the Audio Engineering Society, Nov. 1996, preprint 4382.Google Scholar
- 3.M. Blaze, J. Feigenbaum, J. Lacy, “Decentralized Trust Management”, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173.Google Scholar
- 4.D. Boneh, J. Shaw, “Collusion-secure Fingerprinting for Digital Data”, Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, pp. 452–465Google Scholar
- 5.I. J. Cox and J.M.G. Linnartz, “Public Watermarks and Resistance to Tampering”, Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.Google Scholar
- 6.U.S. National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standards Publication, FIPS PUB 46-1, Jan. 1988.Google Scholar
- 7.F. Hartung and B. Girod, “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain”, Proc. IEEE ICASSP, pp. 2621–4, April 1997.Google Scholar
- 8.“Cryptolope Container Technology”, an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.
- 9.Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.Google Scholar
- 10.International Federation of the Phonograph Industry, Request for Proposals-Embedded signaling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.Google Scholar
- 11.Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 207–226.Google Scholar
- 12.J. Lacy, D. P. Maher, and J. H. Snyder, “Music on the Internet and the Intellectual Property Protection Problem”, Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July 1997.Google Scholar
- 13.J. Lacy, S.R. Quackenbush, A.R. Reibman, D. Shur, J.H. Snyder, “On Combining Watermarking with Perceptual Coding”, submitted to Proc. IEEE ICASSP, 1998.Google Scholar
- 14.MPEG video committee, “Test Model 5”, ISO-IEC/JTC1/SC29/WG11 N0400, April 1993.Google Scholar
- 15.F. Petitcolas, R. Anderson, M. Kuhn, “Attacks on Copyright Marking Systems”, Second Information Hiding Workshop, 1998.Google Scholar
- 16.O. Sibert, D. Bernstein, D. VanWie, “Securing the Content, Not the Wire, for Information Commerce”Google Scholar