DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system

  • Daniel Augot
  • Jean -FranÇois Delaigle
  • Caroline Fontaine
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1485)


This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Diffie-Hellman (DH) protocol and Trusted Third Parties (TTP).

This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.


IPR protection watermarking Key exchange Aquarelle multimedia distributed system 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman. Electronic marking and identification techniques to discourage document copying. In IEEE INFOCOM’94 — Networking for global communications, 1994.Google Scholar
  2. 2.
    F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg. Watermarking digital images for copyright protection. Image Processing and its Applications, pages 326–330, 1995. July.Google Scholar
  3. 3.
    D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In D. Coppersmith, editor, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pages 452–564. Springer, 1995.Google Scholar
  4. 4.
    G. W. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly-available images with a visible image watermark. Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996.Google Scholar
  5. 5.
    I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, 1995.Google Scholar
  6. 6.
    W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, 1976.MathSciNetCrossRefGoogle Scholar
  7. 7.
    W. Diffie, P. C. van Oorshot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107–125, 1992.CrossRefGoogle Scholar
  8. 8.
    R. C. Dixon. Spread Spectrum with Commercial Applications. Wiley, third edition edition, 1994.Google Scholar
  9. 9.
    David Kahn. The history of cryptography. In R. Anderson, editor, Information Hiding, number 1174 in Lecture Notes in Computer Science, pages 1–5. Springer, 1996.Google Scholar
  10. 10.
    E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proc of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995.Google Scholar
  11. 11.
    R. Lidl and H. Niederreiter. Finite Fields. Number 20 in Encyclopedia of Mathematics and its Applications. Addison-Wesley, first edition, 1983.Google Scholar
  12. 12.
    K. Matsui and K. Tanaka. Video-Stenography: How to embed a Signature in a Picture. IMA Intellectual Property Proceedings, 1(1):187–205, January 1994.Google Scholar
  13. 13.
    W. Meier and O. Staffelbach. The self shrinking generator. In R.E. Blahut et al, editor, Communications and Cryptography: Two sides of One Tapestry, pages 287–295. Kluwer Academic Publishers, 1994.Google Scholar
  14. 14.
    B. Pfitsmann and M. Schunter. Asymmetric fingerprinting. In U. Maurer, editor, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pages 84–95. Springer, 1996.Google Scholar
  15. 15.
    R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. Towards a robust digital watermark. In S.Z. Li, D.P. Mital, E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pages 504–508. Springer, 1995.Google Scholar
  16. 16.
    N. Morimo W. Bender, D. Gruhl. Techniques for data hiding. In Proceedings of the SPIE, February 1995. San Jose CA.Google Scholar
  17. 17.
    J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In Peter Paul Klaus Brunnstein, editor, KnowRight 1995, Schriftenreihe der sterreichischen Computer Gesellschaft, Band 82, pages 242–251. Oldenbourg Verlag, 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Daniel Augot
    • 1
  • Jean -FranÇois Delaigle
    • 2
  • Caroline Fontaine
    • 1
  1. 1.INRIA Rocquencourt Domaine de VoluceauLe Chesnay CedexFrance
  2. 2.TELELaboratoire de télédétection et télécommunication de l’Université catholique de Louvain BelgiumLouvain-La-Neuve

Personalised recommendations