Skip to main content

Image distribution method with embedded identifier scheme for copyright protection

  • Applications
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

  • 123 Accesses

Abstract

Copyright violation by the illegal copying of digital images is a serious problem because it is easy to duplicate digital data without deterioration. One proposal is to embed user-specific information in each image, but this is costly for the provider and prevents images from being distributed through economical media such as CD-ROMs. We propose a new distribution method that extends the image distribution scheme by using scrambling at the user side to embed user ID information; this permits images to be economically distributed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H.Fujii, N.Taniguchi, and Y.Yamanaka: Scrambling Digital Images for Distribution through Network. Proceeding of the PTC '96,Honolulu (1996) pp.447.

    Google Scholar 

  2. E.Koch, J.Rindfrey, and J.Zhao: Copyright Protection for Multimedia Data, Proceeding of the Insternational Conference on Digital Media and Electronic Publishing (1994).

    Google Scholar 

  3. I.J.Cox, J.Kilian, T.Leighton, and T.Shamoon: Secure Spread Spectrum Watermarking for Multimedia, NEC Research Institute, Technical Report 95-10 (1995).

    Google Scholar 

  4. W.Bender, D.Gruhl, and N.morimoto: Techniques for Data Hiding, Proceedings of the SPIE 2420 (1995) pp.40.

    Google Scholar 

  5. NIKKEI ELECTRONICS 1996.4.22(No.660) (in Japanese).

    Google Scholar 

  6. Miyaguchi, S.: The FEAL cipher family, Advances in Cryptology — Crypto '90 LNCS537 (1991) pp.627–638.

    Google Scholar 

  7. Information technology — Digital compression and coding of continuous-tone still images: Requirements and guidelines, ISO/IEC 10918-1 (1994).

    Google Scholar 

  8. Information technology — Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s, ISO/IEC 11172 (1993).

    Google Scholar 

  9. Information technology — Generic of moving pictures and associated audio information, ISO/IEC DIS 13818 (1994).

    Google Scholar 

  10. Standard Images and Sequences, CityU Image Processing Laaboratory, http://www.image.cityu.edu.hk/images/imageseq.htittl

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abe, T., Fujii, H., Kushima, K. (1997). Image distribution method with embedded identifier scheme for copyright protection. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027940

Download citation

  • DOI: https://doi.org/10.1007/BFb0027940

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics