Skip to main content

Combinatorial Optimization of Countermeasures against Illegal Copying

  • Conference paper
  • 346 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Abstract

The growth of the Internet has lead to an increase in the distribution on digital contents, such as music, still pictures, and motion pictures through networks. However, it has also lead to an increase in illegal copying without permission from the copyright holder. Although a number of countermeasures against illegal copying have been developed including watermarking and contents capsulation, it is impossible to find one perfect countermeasure. A method is needed that would allow for an optimal combination of different countermeasures to substantially reduce the probability of illegal copying. We propose such a method based on combinatorial optimization and fault-tree analysis. We use this method for a number of cases and show the actual optimal combinations for each case, as well as a flow chart for selecting a proper combination of countermeasures depending on the situation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Matsui, K.: Fundamentals of Digital Watermarking, Morikitasyuppan (1998) (in Japanese)

    Google Scholar 

  2. Katzenbeisser, S., Petitcolas, A.P.(eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  3. Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Trans. of the IEICE 73(7), 1133–1146 (1990)

    Google Scholar 

  4. Gerfinkel, R.S., Nemhauser, G.L.: Integer Programming. Wiley, Chichester (1972)

    Google Scholar 

  5. McCormic, N.J.: Reliability and Risk Analysis. Academic Press, London (1981)

    Google Scholar 

  6. Sakurai, N., et al.: Trend on copy rights protection techniques for content distribution. Information Processing Society in Japan 42(SIG 15 TOD 12), 63–76 (2001) (Japanese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sasaki, R., Yoshiura, H., Itoh, S. (2004). Combinatorial Optimization of Countermeasures against Illegal Copying. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics