Skip to main content

Intellectual Property Protection Systems and Digital Watermarking

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

Adequate protection of digital copies of multimedia content - both audio and video — is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining highfidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, “ISO/IEC MPEG-2 Advanced Audio Coding”, presented at the 101st Convention of the Audio Engineering Society, Nov. 1996, preprint 4382.

    Google Scholar 

  2. D. Aucsmith, “Tamper Resistant Software”, in Proceedings of the First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 317–334.

    Chapter  Google Scholar 

  3. M. Blaze, J. Feigenbaum, J. Lacy, “Decentralized Trust Management”, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173.

    Google Scholar 

  4. D. Boneh, J. Shaw, “Collusion-secure Fingerprinting for Digital Data”, Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, pp. 452–465

    Google Scholar 

  5. I. J. Cox and J.M.G. Linnartz, “Public Watermarks and Resistance to Tampering”, Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.

    Google Scholar 

  6. U.S. National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standards Publication, FIPS PUB 46-1, Jan. 1988.

    Google Scholar 

  7. F. Hartung and B. Girod, “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain”, Proc. IEEE ICASSP, pp. 2621–4, April 1997.

    Google Scholar 

  8. “Cryptolope Container Technology”, an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.

  9. Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October 1997.

    Google Scholar 

  10. International Federation of the Phonograph Industry, Request for Proposals-Embedded signaling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.

    Google Scholar 

  11. Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 207–226.

    Google Scholar 

  12. J. Lacy, D. P. Maher, and J. H. Snyder, “Music on the Internet and the Intellectual Property Protection Problem”, Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July 1997.

    Google Scholar 

  13. J. Lacy, S.R. Quackenbush, A.R. Reibman, D. Shur, J.H. Snyder, “On Combining Watermarking with Perceptual Coding”, submitted to Proc. IEEE ICASSP, 1998.

    Google Scholar 

  14. MPEG video committee, “Test Model 5”, ISO-IEC/JTC1/SC29/WG11 N0400, April 1993.

    Google Scholar 

  15. F. Petitcolas, R. Anderson, M. Kuhn, “Attacks on Copyright Marking Systems”, Second Information Hiding Workshop, 1998.

    Google Scholar 

  16. O. Sibert, D. Bernstein, D. VanWie, “Securing the Content, Not the Wire, for Information Commerce”

    Google Scholar 

  17. J. Smith, B. Comisky, “Modulation and Information Hiding in Images”, Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June, 1996, pp. 207–226.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lacy, J., Quackenbush, S.R., Reibman, A., Snyder, J.H. (1998). Intellectual Property Protection Systems and Digital Watermarking. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics