Abstract
The growth of the Internet has lead to an increase in the distribution on digital contents, such as music, still pictures, and motion pictures through networks. However, it has also lead to an increase in illegal copying without permission from the copyright holder. Although a number of countermeasures against illegal copying have been developed including watermarking and contents capsulation, it is impossible to find one perfect countermeasure. A method is needed that would allow for an optimal combination of different countermeasures to substantially reduce the probability of illegal copying. We propose such a method based on combinatorial optimization and fault-tree analysis. We use this method for a number of cases and show the actual optimal combinations for each case, as well as a flow chart for selecting a proper combination of countermeasures depending on the situation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Matsui, K.: Fundamentals of Digital Watermarking, Morikitasyuppan (1998) (in Japanese)
Katzenbeisser, S., Petitcolas, A.P.(eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Trans. of the IEICE 73(7), 1133–1146 (1990)
Gerfinkel, R.S., Nemhauser, G.L.: Integer Programming. Wiley, Chichester (1972)
McCormic, N.J.: Reliability and Risk Analysis. Academic Press, London (1981)
Sakurai, N., et al.: Trend on copy rights protection techniques for content distribution. Information Processing Society in Japan 42(SIG 15 TOD 12), 63–76 (2001) (Japanese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sasaki, R., Yoshiura, H., Itoh, S. (2004). Combinatorial Optimization of Countermeasures against Illegal Copying. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive