Skip to main content

Protecting Intellectual Property Rights and the JPEG2000 Coding Standard

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3746))

Abstract

The ever-increasing use of the Internet and file sharing applications based on Peer to Peer networks has alarmed content authors, providers and resellers of digital content. Techniques proposed for protecting digital media include watermarking, use of metadata and self-protection and self-authentication. In this paper we review the most important of these methods and analyse their potential use in Digital Rights Management systems. The main focus is on IPR management through watermarking for digital images coded with the new and a lot promising compression standard: JPEG2000.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International, I.P.R.: Alliance, Special 301 Recommendations, available online (2004), http://wwwiipa.com/pdf/2004SPEC301LOSS.pdf

  2. Fetscherin, M., Schmid, M.: Comparing the usage of digital rights management systems in the music, film, and print industry. In: Proceedings of the 5th international conference on Electronic commerce, pp. 316–325 (2003)

    Google Scholar 

  3. Eskicioglu, E.M.: Protecting Intellectual Property in Digital Multimedia Networks. Computer 36, 39–45 (2003)

    Article  Google Scholar 

  4. Cohen, J.E.: DRM and Privacy. Communications of the ACM 46(4), 46–49 (2003)

    Article  Google Scholar 

  5. Iannella, R.: Digital Rights Management (DRM) Architectures. D-Lib Magazine 7(6) (2001)

    Google Scholar 

  6. Lotspiech, J., Nusser, S., Pestoni, F.: Anonymous Trust: Digital Rights Management Using Broadcast Encryption. Proc. of IEEE 92(6), 898–909 (2004)

    Article  Google Scholar 

  7. Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital Rights Management for Content Distribution. In: Australian Information Security Workshop (2003)

    Google Scholar 

  8. Voyatzis, G., Pitas, I.: Image Watermarking for Copyright Protection and Authentication. In: Bovik, A. (ed.) Handbook of Image & Video Processing. Academic Press, London (2000)

    Google Scholar 

  9. Fotopoulos, V., Skodras, A.N.: Digital Image Watermarking: An Overview. EURASIP Newsletter 14(4) (2003)

    Google Scholar 

  10. Fotopoulos, V., Skodras, A.N.: A Subband DCT Approach to Image Watermarking. In: Proc. X European Signal Processing Conference (2000)

    Google Scholar 

  11. Taubman, D.S., Marcellin, M.W.: JPEG2000: Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  12. Liang, J., Xu, P., Tran, T.D.: A universal robust low frequency watermarking scheme. In: IEEE Transactions on Image Processing (2000)

    Google Scholar 

  13. Perreira, S., Voloshynovskiy, S., Pun, T.: Optimized wavelet domain watermark embedding strategy using linear programming. In: Szu, H.H. (ed.) SPIE AeroSence 2000: Wavelet Applications, vol. VII (2000)

    Google Scholar 

  14. JPEG 2000 Secured (JPSEC), available online (2000), http://www.jpeg.org/jpeg2000/j2kpart8.html

  15. Kocher, P., Jaffe, J., Jun, B., Lawson, N.: Self protecting digital content. Cryptographic Research Inc, CRI, available online (2005), http://www.cryptography.com/resources/whitepapers/SelfProtectingContent.pdf

  16. Koenen, R.H., Lacy, J., Mackay, M., Mitchell, S.: The long to interoperable digital rights management. Proc. of IEEE 92(6), 883–897 (2004)

    Article  Google Scholar 

  17. Kim, Y.S., Kwon, O.H., Park, R.H.: Wavelet based watermarking method for digital images using the human visual system. Electronic Letters 35, 466–467 (1999)

    Article  Google Scholar 

  18. Davoine, F.: Comparison of two wavelet based image watermarking schemes. In: Proceedings of the IEEE International Conference on Image Processing (2000)

    Google Scholar 

  19. Meerwald, P.: Quantization Watermarking in the JPEG2000 Coding Pipeline. In: Communications and Multimedia Security Issues of the New Century, IFIP TC6/TC11, Fifth Joint Working Conference on Communications and Multimedia Security, CMS 2001, Kluwer Academic Publishing, Darmstadt (2001)

    Google Scholar 

  20. DRMWatch: Analysis of CRI’s Self Protecting Digital Content, available online (2005), http://www.drmwatch.com/special/article.php/3095031

  21. Rosenblatt, B., Trippe, B., Mooney, S.: Digital Rights Management-Business and Technology. M&T Books (2002)

    Google Scholar 

  22. Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. Journal of Systems and Software 73(3), 533–549 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vassiliadis, B., Fotopoulos, V., Ilias, A., Skodras, A.N. (2005). Protecting Intellectual Property Rights and the JPEG2000 Coding Standard. In: Bozanis, P., Houstis, E.N. (eds) Advances in Informatics. PCI 2005. Lecture Notes in Computer Science, vol 3746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11573036_67

Download citation

  • DOI: https://doi.org/10.1007/11573036_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29673-7

  • Online ISBN: 978-3-540-32091-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics