A Novel Framework for Multiple Creatorship Protection of Digital Movies

  • Yu-Quan Zhang
  • Sabu Emmanuel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3919)


A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this paper, we propose a framework for providing the creatorship protection of multiple creators involved in creating the object-based digital movie. The proposed framework makes use of digital watermarking techniques and cryptographic protocols to achieve the creatorship protection purpose. Object-based movie may consist of several audio and video objects, which may be created by different creators. The proposed framework embeds different watermarks in different video/audio objects in such a way that each creator can show the joint-creatorship of the movie; as well as each creator can prove his/her creatorship of video/audio object he/she created.


Watermark Scheme Video Object Cryptographic Protocol Digital Right Management Watermark Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. In: Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information 87 (to appear, June 1999)Google Scholar
  2. 2.
    Eggers, J.J., Su, J.K., Girod, B.: Asymmetric Watermarking Schemes. In: Tagungsband Des GI Workshops Sicherheit in Mediendaten, Berlin, Germany, September 2000, pp. 107–123 (2000)Google Scholar
  3. 3.
    Cox, J., Killian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  4. 4.
    Pfitzmann, B., Schunfer, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  5. 5.
    Kim, T.Y., Choi, H., Lee, K., Kim, T.: An Asymmetric Watermarking System With Many Embedding Watermarks Corresponding to One Detection Watermark. IEEE Signal Processing Letters 11(3) (March 2004)Google Scholar
  6. 6.
    Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownerships? Technical Report RC 20509, IBM Research Division (July 1996)Google Scholar
  7. 7.
    Qiao, L., Nahrstedt, K.: Watermarking Schemes and Protocols For Protecting Rightful Ownership And Customer’s Rights, ICLASS and National Science Foundation Career Grant CCR-96-23867Google Scholar
  8. 8.
    Guo, H., Georganas, N.D.: Digital image watermarking for joint ownership. In: ACM Multimedia 2002, pp. 362–371 (December 2002)Google Scholar
  9. 9.
    Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In: Proc. European Signal Processing DCDonf. (EUSIPCO 1998), Rhodes, Greece (September 1998)Google Scholar
  10. 10.
    Wu, C.P., Jay Kuo, C.C.: Fragile Speech Watermarking based on Exponential Scale Quantization for Tamper Detection. In: 2000 IEEE International Conference on Acoustics, Speech and Signal Processing, Orlando, Florida (May 2002)Google Scholar
  11. 11.
    Elkamchouchi, H., Elshenawy, K., Shaban, H.A.: New digital signature schemes in the real and gaussian integers domains. In: 21st National Radio Science Conference (NRSC 2004) (NTI) (March 2004)Google Scholar
  12. 12.
    Cheng, Q., Sorensen, J.: Spread Spectrum Signaling for Speech Watermarking. In: IEEE 2001 International Conference on Acoustics, Speech and Signa1 Processing (2001)Google Scholar
  13. 13.
    Tefas, A., Giannoula, A., Nikolaidis, N., Pitas, I.: Enhanced transform-Domain Correlation-Based Audio Watermarking. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), March 18-23, 2005, vol. 2, pp. 1049–1052 (2005)Google Scholar
  14. 14.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Chang, C.-C., Chang, Y.-F.: Signing a Digital Signature Without Using One-Way Hash Functions and Message Redundancy Schemes. IEEE Communications Letters 8(8) (August 2004)Google Scholar
  16. 16.
    Emmanuel, S., Kankanhalli, M.S.: Digital Rights Management Issues for Video. In: Furht, B., Kirovski, D. (eds.) Multimedia Security Handbook, ch. 26, pp. 759–787. CRC Press, Boca Raton (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yu-Quan Zhang
    • 1
  • Sabu Emmanuel
    • 1
  1. 1.School of Computer EngineeringNanyang Technological UniversitySingapore

Personalised recommendations