Skip to main content

Equitable conditional access and copyright protection for image based on trusted third parties

  • Session E: Multimedia Support
  • Conference paper
  • First Online:
Teleservices and Multimedia Communications (COST237 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1052))

Included in the following conference series:

Abstract

Image communication needs new cryptological tools for conditional access, copyright protection and image authentication. The aim of this paper is to overview the corresponding systems' features. The design of efficient copyright protection by watermarking images and image authentication by signatures is also briefly discussed. It is shown that equitable systems need the use of a Trusted Third Party, and a possible solution is presented. The implementation of this new function in the multimedia world strongly differs from that in the Electronic Data Interchange environment where it is already well known. This difference will also be detailed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. L. Friedman: The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image, IEEE Trans. on Consumer Electronics, vol. 39, no.4, 1993, pp. 905–910.

    Google Scholar 

  2. L. C. Guillou, M. Ugon and J.-J. Quisquater, The Smart Card: A Standardized Security Device Dedicated to Public Cryptology in Gus J. Simmons (Editor) Contemporary cryptology. The science of information integrity, IEEE Press, 1992, pp. 561–613.

    Google Scholar 

  3. M. E. Hellman: An extension of the Shannon Theory Approach to Cryptography, IEEE Trans. on Information Theory, vol 23, no.3, May 1977, pp. 289–294.

    Google Scholar 

  4. N. Koike, T. Matsumoto and H. Imai: A Scheme for Copyright Protection of Digital Images, SCIS93 (The 1993 Symp. on Cryptography and Information Security, Shuzenji, Japan, January 1993, paper 13C (in Japanese).

    Google Scholar 

  5. B. Macq and J.-J. Quisquater: Digital Images Multiresolution Encryption, The Journal of the Interactive Multimedia Association Intellectual Property Project, vol. 1, no 1, pp. 179–186, January 1994.

    Google Scholar 

  6. K. Matsui and K. Tanaka: How to Secretly Embed a Signature in a Picture, The Journal of the Interactive Multimedia Association Intellectual Property Project, vol. 1, no 1, pp. 187–206, January 1994.

    Google Scholar 

  7. W. J. Mitchell: When Is Seeing Believing?, Scientific American, February 1994, pp. 44–49.

    Google Scholar 

  8. A.N. Netravali and B. Prasada, Adaptive quantization of picture signals using spatial masking, Proc. of IEEE, vol. 65, 1977, pp. 536–548 1990, pp. 387–394.

    Google Scholar 

  9. C. E. Shannon: Communication Theory of Secret Systems, Bell System Technical Journal, vol 28, no 4, 1949, pp. 656–715.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

David Hutchison Henning Christiansen Geoff Coulson André Danthine

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boucqueau, J.M., Lacroix, S., Macq, B., Quisquater, J.J. (1996). Equitable conditional access and copyright protection for image based on trusted third parties. In: Hutchison, D., Christiansen, H., Coulson, G., Danthine, A. (eds) Teleservices and Multimedia Communications. COST237 1995. Lecture Notes in Computer Science, vol 1052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61028-6_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-61028-6_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61028-1

  • Online ISBN: 978-3-540-49849-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics