Skip to main content

Application of ‘Attack Trees’ Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)

  • Conference paper
Interactive Multimedia and Next Generation Networks (MIPS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3311))

Included in the following conference series:

Abstract

The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting approach to solve these problems. However, watermarks by themselves do not provide enough protection, but they must be used in certain scenarios fulfilling a number of requirements. In this paper we present the results of the application of a risk analysis technique (specifically ‘attack trees’ technique) to the most demanding schemes developed so far, and a new protocol or business model derived from the main conclusions of this process, which we have called SecDP (Secure Distribution Protocol).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. Security and watermarking of multimedia contents III. In: Wong, P.W., Delp, E. (eds.) Proc. SPIE, vol. 4314, pp. 269–279 (2001)

    Google Scholar 

  2. Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks. IEEE Internet Computing (2002)

    Google Scholar 

  3. Qian, L., Nahrstedt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights. Journal of Visual Communications and Image Representation 9(3), 194–202 (1998)

    Article  Google Scholar 

  4. Memon, N., Wong, P.: A Buyer- Seller Watermarking Protocol. In: IEEE Signal Processing Society. Electronic Proceedings, Los Angeles, USA (1998)

    Google Scholar 

  5. Amoroso, E.: Fundamentals of Computer Security Technology. Prentice Hall PTR, Englewood Cliffs (1994)

    MATH  Google Scholar 

  6. Schneier, B.: Modeling security threats. Dr. Dobb’s Journal (1999), http://www.schneier.com/paper-attacktrees-ddj-ft.html

  7. Tomsich, P., Katzenbeisser, S.: Copyright protection protocols for multimedia distribution based on trusted hardware. In: PROMS 2000, Cracow, Poland, pp. 249–256 (2000)

    Google Scholar 

  8. Piva, A., Bartolini, F., Barni, M.: Managing Copyright in Open Networks. IEEE Internet Computing (2002)

    Google Scholar 

  9. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  10. Goirizelaia, I., Unzilla, J.J.: A new watermarking method using high frequency components to guide the insertion process in the spatial domain. Lectures Notes in Computer Science. Springer, Ljubljana (1999)

    Google Scholar 

  11. Katzenbesisser, S., Peticolas, F.A.P.: Information Hiding: techniques for steganography and digital watermarking. Artech House (2000)

    Google Scholar 

  12. Johnson, N., Duric, Z., Jajodia, S.: Information Hiding: steganography and watermarking – attacks and countermeasures. Kluwer Academic Publishers, Dordrecht (2001)

    Google Scholar 

  13. Peticolas, F.A.P., Anderson, R.J., Jun, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 415–438. Springer, Heidelberg (1998)

    Google Scholar 

  14. Craver, S., Memon, B., Yeo, L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communication 16, 573–586 (1998)

    Article  Google Scholar 

  15. Voloshynovskiy, S., Pereira, S., Pun, T.: Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. IEEE Communications Magazine 39 (2001)

    Google Scholar 

  16. Amenaza Technologies Limited, http://www.amenaza.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Higuero, M.V., Unzilla, J.J., Jacob, E., Sáiz, P., Luengo, D. (2004). Application of ‘Attack Trees’ Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol). In: Roca, V., Rousseau, F. (eds) Interactive Multimedia and Next Generation Networks. MIPS 2004. Lecture Notes in Computer Science, vol 3311. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30493-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30493-7_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23928-4

  • Online ISBN: 978-3-540-30493-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics