Effective Content Tracking for Digital Rights Management in Digital Libraries

  • Jen-Hao Hsiao
  • Cheng-Hung Li
  • Chih-Yi Chiu
  • Jenq-Haur Wang
  • Chu-Song Chen
  • Lee-Feng Chien
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4172)


A usual way for content protection of digital libraries is to use digital watermarks and a DRM-based access-control environment. These methods, however, have limitations. Digital watermarks embedded in digital content could be removed by malicious users via post-processing, whereas DRM-based access-control solutions could be hacked. In this paper, we introduce a content tracking mechanism that we have built for multimedia-content near-replica detection as the second line of defense. The integrated framework aims to detect unlawful copyright infringements on the Internet, and combines the strengths of static rights enforcement and dynamic illegal content tracking. The issues of accuracy and huge computation cost in copy detection have been addressed by the introduced content-based techniques. Our experiments demonstrate the efficacy of proposed copy detector.


Digital Library Dynamic Time Warping Digital Content Digital Watermark Digital Right Management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Berrani, S.-A., Amsaleg, L., Gros, P.: Robust content-based image searches for copyright protection. In: Proceedings of the 1st ACM international workshop on Multimedia databases, pp. 70–77 (2003)Google Scholar
  2. 2.
    Bhat, D.-N., Nayar, S.-K.: Ordinal measures for image correspondence. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(4), 415–423 (1998)CrossRefGoogle Scholar
  3. 3.
    Bogdan, C.P., et al.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 1–10 (2004)Google Scholar
  4. 4.
    Chang, E.-Y., Wang, J.-Z., Li, C., Wiederhold, G.: RIME: a replicated image detector for the world-wide-web. In: San Jose, C.A. (ed.) Proceedings of the SPIE Multimedia Storage and Archiving Systems, San Jose, CA (November 1998)Google Scholar
  5. 5.
    Duhl, J., Kevorkian, S.: Understanding DRM Systems. An IDC Research White Paper (2001)Google Scholar
  6. 6.
    Figueiredo, M.A.F., Jain, A.-K.: Unsupervised learning of Finite mixture models. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 381–396 (2002)CrossRefGoogle Scholar
  7. 7.
    Hampapur, A., Hyun, K.-H., Bolle, R.M.: Comparison of sequence matching techniques for video copy detection. In: The SPIE Conference on Storage and Retrieval for Media Databases, pp. 194–201 (2002)Google Scholar
  8. 8.
    Hua, X.S., Chen, X., Zhang, H.J.: Robust video signature based on ordinal measure. In: International Conference on Image Processing (2004)Google Scholar
  9. 9.
    Hsiao, J.-H., Chen, C.-S., Chien, L.-F., Chen, M.-S.: Image Copy Detection via Grouping in Feature Space Based on Virtual Prior Attacks. In: Proceeding of International Conference on Image Processing, Atlanta, GA, USA (2006)Google Scholar
  10. 10.
    Hsiao, J.-H., Wang, J.-H., Chen, M.-S., Chen, C.-S., Chien, L.-F.: Constructing a Wrapper- Based DRM System for Digital Content Protection in Digital Libraries. In: Fox, E.A., Neuhold, E.J., Premsmit, P., Wuwongse, V. (eds.) ICADL 2005. LNCS, vol. 3815, pp. 375–379. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Kim, C.: Content-based Image Copy Detection. Signal Processing: Image Communication 18, 169–184 (2003)CrossRefGoogle Scholar
  12. 12.
    Kim, C., Vasudev, B.: Spatiotemporal sequence matching for efficient video copy detection. IEEE Transactions on Circuits and Systems for Video Technology 15(1), 127–132 (2005)CrossRefGoogle Scholar
  13. 13.
    Lu, C.-S., Hsu, C.-Y., Sun, S.-W., Chang, P.-C.: Robust mesh-based hashing for copy detection and tracing of images. In: Proceedings of IEEE International Conference on Multimedia and Expo., vol. 1, pp. 731–734 (June 2004)Google Scholar
  14. 14.
    Nicolakis, T., Pizano, C.E., Prumo, B., Webb, M.: Protecting Digital Archives at the Greek Orthodox Archdiocese of America. In: Proceedings of the 2003 ACM workshop on Digital rights management (October 2003)Google Scholar
  15. 15.
    Petitcolas, F.: Watermarking Schemes Evaluation. IEEE Signal Processing Magazine 17(5), 58–64 (2000)CrossRefGoogle Scholar
  16. 16.
    Pramod, A.J., Gregory, L.H.: DRM as a layered system. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 11–21 (2004)Google Scholar
  17. 17.
    Susanne, G.: A Sample DRM System. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 150–161. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  18. 18.
    Yan, K., Sukthankar, R., Huston, L.: Efficient Near-duplicate Detection and Subimage Retrieval. In: Proceedings of the 12th annual ACM international conference on Multimedia, session 13, pp. 869–876 (2004)Google Scholar
  19. 19.
    Yuan, J., Tian, Q., Ranganath, S.: Fast and robust search method for short video clips from large video collection. In: International Conference on Pattern Recognition, Cambridge, UK (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jen-Hao Hsiao
    • 1
  • Cheng-Hung Li
    • 1
  • Chih-Yi Chiu
    • 1
  • Jenq-Haur Wang
    • 1
  • Chu-Song Chen
    • 1
  • Lee-Feng Chien
    • 1
  1. 1.Institute of Information ScienceAcademia SinicaTaipeiTaiwan

Personalised recommendations