Skip to main content

Forensic Watermarking in Digital Rights Management

  • Chapter

Part of the book series: Data-Centric Systems and Applications ((DCSA))

Abstract

In this chapter, we give a brief introduction to digital watermarking and discuss its applications in DRM systems. Watermarks are particularly useful in DRM systems due to their ability to bridge the gap between analog and digital domains. In playback control applications, a watermark is embedded in the master copy of a content and encodes associated usage rules, which are enforced by compliant devices during playback. On the other hand, in forensic tracking applications, a unique watermark is embedded in each individual copy of the content; this watermark allows the authorities to identify the source of an illegal copy. After discussing the basic principles of spread spectrum watermarks, we outline the architecture of an online content distribution system that employs watermarks in order to enable forensic tracking.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Arnold, and Z. Huang, “Fast audio watermarking concepts and realizations”, Electronic Imaging 2004, Security and Watermarking of Multimedia Content VI, San Jose, USA, 2004.

    Google Scholar 

  2. E. Becker, W. Buhse, D. Gnnewig, N. Rump (editors), Digital rights management: Technological, Economic, Legal and Political Aspects, Springer Verlag, Berlin 2003.

    MATH  Google Scholar 

  3. J. Benaloh, “Key Compression and its Application to Digital Finger-printing”, Technical report, Microsoft Research, 2000.

    Google Scholar 

  4. I.J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Volume 6, pp. 1673–1687, 1997.

    Article  Google Scholar 

  5. I. Cox, M. Miller, and J. Bloom, “Digital Watermarking.” San Francisco, Morgan Kauffman, 2002.

    Google Scholar 

  6. J. Crowcroft, C. Perkins, and I. Brown, “A method and apparatus for generating multiple watermarked copies of an information signal,” WO patent application 00/56059, 2000.

    Google Scholar 

  7. S. Czerwinski, R. Fromm, T. Hodes, “Digital music distribution and audio watermarking”, UCB IS 219, technical report, 1999.

    Google Scholar 

  8. V. M. Dasilva and E. S. Sousa, “Multicarrier orthogonal CDMA signals for quasisynchronous communication systems”, IEEE Journal on Selected Areas in Communications, vol. 12, pp. 842–852, 1994.

    Article  Google Scholar 

  9. Digital Cinema Initiatives LLC, “Digital Cinema System Specification, v1.0”, July 2005, available at http://www.dcimovies.com/.

    Google Scholar 

  10. J. Fridrich and M. Goljan, “Comparing Robustness of Watermarking Techniques”, Electronic Imaging’99, The International Society of Optical Engineering, Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, 1999.

    Google Scholar 

  11. J. Haitsma and A.A.C. Kalker, “A highly-robust audio fingerprinting system with efficient search strategy,” 3rd international conference on music information retrieval, Paris, France, 2002.

    Google Scholar 

  12. F. Hartung and M. Kutter, “Multimedia watermarking techniques”, Proc. IEEE, vol. 87, pp. 1079–1107, 1999.

    Article  Google Scholar 

  13. W. Jonker and J. Linnartz, Digital Rights Management in Consumer Electronics Products, IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, vol. 21, no. 2, pp. 82–91, 2003.

    Google Scholar 

  14. T. Kalker, Considerations on Watermark Security, IEEE Workshop on Multimedia Signal Processing, October, 2002.

    Google Scholar 

  15. M. Kutter and F.A.P. Petitcolas, “A Fair Benchmark for Image Watermarking Systems”, Electronic Imaging’99, The International Society of Optical Engineering, Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, 1999.

    Google Scholar 

  16. M. Kuter, S. Voloshynovskiy, A. Herrigel, “The watermark copy attack,” Electronic Imaging 2000, Security and Watermarking of Multimedia Content II, San Jose, USA, 2000.

    Google Scholar 

  17. G. Langelaar, I. Setyawan, and R. Lagendijk, “Watermarking digital image and video data: a state-of-the-art overview”, IEEE Signal Processing Magazine, vol. 17, pp. 20–46, 2000.

    Article  Google Scholar 

  18. A.N. Lemma, J. Aprea, W. Oomen and L. van de Kerkhof, “A temporal domain audio watermarking technique”, IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 1088–1097, April, 2003.

    Article  MathSciNet  Google Scholar 

  19. M. Maes, T. Kalker, J.-P.M.G. Linnartz, J. Talstra, F.G. Depovere and J. Haitsma, “Digital watermarking for DVD video copy protection”, IEEE Signal Processing Magazine, Volume 17, Issue 5, pp. 47–57, 2000.

    Article  Google Scholar 

  20. B. G. Mobasseri, “Exploring CDMA for watermarking of digital video”, Proceedings of the SPIE, vol. 3657, pp. 96–102, 1999.

    Article  Google Scholar 

  21. A.W.J. Oomen, M.E. Groenewegen, R.G. van der Waal and R.N.J. Veldhuis, “A Variable-Bit-Rate Buried-Data Channels for Compcact Disc”, In the Proceedings of the 96th AES convention, Amsterdam, 1994.

    Google Scholar 

  22. R. Parviainen and P. Parnes, “Large scale distributed watermarking of multicast through encryption”, in Communications and multimedia security issues of the new century, Kluwer, pp. 149–158, 2001.

    Google Scholar 

  23. F. A. P. Petitcolas and R. J. Anderson, Weaknesses of Copyright marking systems, Multimedia and Security Workshop, ACM Multimedia’98, Bristol, UK, September 1998.

    Google Scholar 

  24. R. Prasad and S. Hara, “Overview of multicarrier CDMA”, IEEE Communications Magazine, pp. 126–133, Dec. 1997.

    Google Scholar 

  25. B. Schneier, Applied Cryptography, New York, Wiley, 1997.

    Google Scholar 

  26. Secure Digital Music Initiative (SDMI), Call for Proposals for Phase II Screening Technology, Version 1.0, February 24, 2000.

    Google Scholar 

  27. M. Steinebach, S. Zmudzinski, F. Chen, “The digital watermarking container: Secure and Efficient Embedding,” Proceedings of the Multimedia and Security Workshop, Magdeburg, Germany, 2004.

    Google Scholar 

  28. M. Swanson, M. Kobayashi, and A. Tewfik, “Multimedia data-embedding and watermarking technologies”, Proc. IEEE, vol. 86, no. 6, pp. 1064–1087, June 1998.

    Article  Google Scholar 

  29. L. Vandendorpe, “Multitone spread spectrum multiple access communications system in a multipath Rician fading channel”, IEEE Trans. Veh. Technol., vol. 44, pp. 327–337, 1995.

    Article  Google Scholar 

  30. H.L. van Trees, “Detection, Estimation, and Modulation Theory”, Reprint edition, Wiley-Interscience, New York, USA, 2001.

    Google Scholar 

  31. M. van der Veen, F. Bruekers, J. Haitsma, T. Kalker, A.N. Lemma and W. Oomen, “Robust, Multi-Functional and High-Quality Audio Watermarking Technology”, 110th AES convention Amsterdam, The Netherlands, May 12–15, 2001.

    Google Scholar 

  32. M. van der Veen, A. Lemma, F. Bruekers, T. Kalker and J. Aprea, “Security issues in digital audio watermarking,” European Signal Processing Conference (EUSIPCO), Toulouse, France, 2002

    Google Scholar 

  33. M. van der Veen, A. Lemma, and A.A.C. Kalker, “Electronic content delivery and forensic tracking,” Multimedia Systems, vol. 11, no. 2, pp. 174–184, 2005.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

van der Veen, M., Lemma, A., Celik, M., Katzenbeisser, S. (2007). Forensic Watermarking in Digital Rights Management. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69861-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69860-9

  • Online ISBN: 978-3-540-69861-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics