Advertisement

Application of ‘Attack Trees’ Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)

  • Ma Victoria Higuero
  • Juan José Unzilla
  • Eduardo Jacob
  • Purificación Sáiz
  • David Luengo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3311)

Abstract

The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting approach to solve these problems. However, watermarks by themselves do not provide enough protection, but they must be used in certain scenarios fulfilling a number of requirements. In this paper we present the results of the application of a risk analysis technique (specifically ‘attack trees’ technique) to the most demanding schemes developed so far, and a new protocol or business model derived from the main conclusions of this process, which we have called SecDP (Secure Distribution Protocol).

Keywords

Watermark Scheme Digital Content Electronic Commerce Digital Watermark Trusted Third Party 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III. In: Wong, P.W., Delp, E. (eds.) Proc. SPIE, vol. 4314, pp. 269–279 (2001)Google Scholar
  2. 2.
    Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks. IEEE Internet Computing (2002)Google Scholar
  3. 3.
    Qian, L., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights. Journal of Visual Communications and Image Representation 9(3), 194–202 (1998)CrossRefGoogle Scholar
  4. 4.
    Memon, N., Wong, P.: A Buyer- Seller Watermarking Protocol. In: IEEE Signal Processing Society. Electronic Proceedings, Los Angeles, USA (1998)Google Scholar
  5. 5.
    Amoroso, E.: Fundamentals of Computer Security Technology. Prentice Hall PTR, Englewood Cliffs (1994)zbMATHGoogle Scholar
  6. 6.
    Schneier, B.: Modeling security threats. Dr. Dobb’s Journal (1999), http://www.schneier.com/paper-attacktrees-ddj-ft.html
  7. 7.
    Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. In: PROMS 2000, Cracow, Poland, pp. 249–256 (2000)Google Scholar
  8. 8.
    Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks. IEEE Internet Computing (2002)Google Scholar
  9. 9.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
  10. 10.
    Goirizelaia, I., Unzilla, J.J.: A new watermarking method using high frequency components to guide the insertion process in the spatial domain. Lectures Notes in Computer Science. Springer, Ljubljana (1999)Google Scholar
  11. 11.
    Katzenbesisser, S., Peticolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Artech House (2000)Google Scholar
  12. 12.
    Johnson, N., Duric, Z., Jajodia, S.: Information Hiding: steganography and watermarking – attacks and countermeasures. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
  13. 13.
    Peticolas, F.A.P., Anderson, R.J., Jun, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 415–438. Springer, Heidelberg (1998)Google Scholar
  14. 14.
    Craver, S., Memon, B., Yeo, L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communication 16, 573–586 (1998)CrossRefGoogle Scholar
  15. 15.
    Voloshynovskiy, S., Pereira, S., Pun, T.: Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. IEEE Communications Magazine 39 (2001)Google Scholar
  16. 16.
    Amenaza Technologies Limited, http://www.amenaza.com

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Ma Victoria Higuero
    • 1
  • Juan José Unzilla
    • 1
  • Eduardo Jacob
    • 1
  • Purificación Sáiz
    • 1
  • David Luengo
    • 1
  1. 1.Faculty of Engineering of BilbaoUniversity of the Basque CountryBilbaoSpain

Personalised recommendations