A Copyright Protection Environment for Digital Images

  • Alexander Herrigel
  • Adrian Perrig
  • Joseph J. K. Ó Ruanaidh
Part of the DUD-Fachbeiträge book series (DUD)


This paper* presents a new approach for the copyright protection of digital images transmitted over the Internet. Current watermark techniques emphasise the robustness of digital watermarks only. In addition to being robust, our approach uses cryptographic protocols and public key techniques to ensure the legal binding of spread spectrum based watermark methods. Our approach allows legal action even if a watermark is not found because ownership is legally registered. We show that the copyright problem can be reduced in its complexity if the copyright verification process is associated with the consumer side of the commercial digital image distribution process.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Cinque]
    Robert A. Cinque, “Making Cyberspace Safe for Copyright: The Protection of Electronic Works in a Protocol to the Berne Convention”, 18 FORDHAM INT’L L.J., 1995, citing BerneConvention art 7(6).Google Scholar
  2. [Craver]
    Scott Craver, Nasir Memon, Boon-Lock Yeo and Minerva Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?”, IBM Research Report, RC 20509, July 25, 1996.Google Scholar
  3. [ISO 11770-3]
    ISO/IEC CD International Standard 11770–3 “Information technology- Security techniques-Key management”, Part 3: Mechanisms using asymmetric techniques, 1994.Google Scholar
  4. [Kutter]
    Martin Kutter and Frederic Jordan, “Digital Signatures of Color Images using Amplitude Modulation”, SPIE-EI97 Proceedings, 1997.Google Scholar
  5. [NEC]
    I. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio and Video”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.Google Scholar
  6. [Ö Ruanaidh]
    Joseph J.K. Ó Ruanaidh and Thierry Pun, “Rotation, Scale and Translation Invariant Digital Image Watermarking”, Signal Processing, January 1997.Google Scholar
  7. [Pfitzmann]
    Birgit Pfitzmann, Ross Anderson (Ed.), “Information Hiding”, “Information Hiding Terminology”, First International Workshop, Cambridge, UK, May/June, 1996, Proceedings, Springer, Lecture Notes in Computer Science, 1174.Google Scholar
  8. [Pitas]
    I. Pitas, “A method for Signature Casting on Digital Images”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.Google Scholar
  9. [Schneier]
    Bruce Schneier, “Applied Cryptography”, John Wiley and Sons Inc., 1994.Google Scholar
  10. [SKIP]
    A. Aziz, “SKIP extension for Perfect Forward Secrecy”, Internet draft, work in progress, February 1996.Google Scholar
  11. [SSL]
    A. Freier and P. Karlton and P. Kocher, “SSL Version 3.0”, Netscape Communications, Version 3.0, November 1996.Google Scholar
  12. [USCopyright]
    Copyright Act of the United States, Section 106, 1. 3. 1995,
  13. [X509]
    R. Housley, D. Solo, and W. Ford, IETF: PKI Working Group (PKIX),: X.509 Certificate and CRL Profile, “Internet Public Key Infrastructure Parti”, 03. 01. 1997.Google Scholar
  14. [Zhao]
    J. Zhao and E. Koch, “Embedding Robust Labels Into Images For Copyright Protection”, Proc. Of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden 1997

Authors and Affiliations

  • Alexander Herrigel
    • 1
  • Adrian Perrig
    • 2
  • Joseph J. K. Ó Ruanaidh
    • 3
  1. 1.r3 security engineering agAathalSwitzerland
  2. 2.École Polytechnique Fédérale de Lausanne EPFL-LSELausanneSwitzerland
  3. 3.Centre Universitaire d’InformatiqueUniversity of GenevaGenevaSwitzerland

Personalised recommendations