Advertisement

Combinatorial Optimization of Countermeasures against Illegal Copying

  • Ryoichi Sasaki
  • Hiroshi Yoshiura
  • Shinji Itoh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Abstract

The growth of the Internet has lead to an increase in the distribution on digital contents, such as music, still pictures, and motion pictures through networks. However, it has also lead to an increase in illegal copying without permission from the copyright holder. Although a number of countermeasures against illegal copying have been developed including watermarking and contents capsulation, it is impossible to find one perfect countermeasure. A method is needed that would allow for an optimal combination of different countermeasures to substantially reduce the probability of illegal copying. We propose such a method based on combinatorial optimization and fault-tree analysis. We use this method for a number of cases and show the actual optimal combinations for each case, as well as a flow chart for selecting a proper combination of countermeasures depending on the situation.

Keywords

Mobile Phone Fault Tree Digital Watermark Integer Programming Problem Copyright Holder 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Matsui, K.: Fundamentals of Digital Watermarking, Morikitasyuppan (1998) (in Japanese)Google Scholar
  2. 2.
    Katzenbeisser, S., Petitcolas, A.P.(eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)Google Scholar
  3. 3.
    Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Trans. of the IEICE 73(7), 1133–1146 (1990)Google Scholar
  4. 4.
    Gerfinkel, R.S., Nemhauser, G.L.: Integer Programming. Wiley, Chichester (1972)Google Scholar
  5. 5.
    McCormic, N.J.: Reliability and Risk Analysis. Academic Press, London (1981)Google Scholar
  6. 6.
    Sakurai, N., et al.: Trend on copy rights protection techniques for content distribution. Information Processing Society in Japan 42(SIG 15 TOD 12), 63–76 (2001) (Japanese)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Ryoichi Sasaki
    • 1
  • Hiroshi Yoshiura
    • 2
  • Shinji Itoh
    • 2
  1. 1.Tokyo Denki UniversityTokyoJapan
  2. 2.Systems Development LaboratoryHitachi, Ltd.YokohamaJapan

Personalised recommendations