Abstract
This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Diffie-Hellman (DH) protocol and Trusted Third Parties (TTP).
This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.
Chapter PDF
References
J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman. Electronic marking and identification techniques to discourage document copying. In IEEE INFOCOM’94 — Networking for global communications, 1994.
F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg. Watermarking digital images for copyright protection. Image Processing and its Applications, pages 326–330, 1995. July.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In D. Coppersmith, editor, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pages 452–564. Springer, 1995.
G. W. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly-available images with a visible image watermark. Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996.
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, 1995.
W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, 1976.
W. Diffie, P. C. van Oorshot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107–125, 1992.
R. C. Dixon. Spread Spectrum with Commercial Applications. Wiley, third edition edition, 1994.
David Kahn. The history of cryptography. In R. Anderson, editor, Information Hiding, number 1174 in Lecture Notes in Computer Science, pages 1–5. Springer, 1996.
E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proc of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995.
R. Lidl and H. Niederreiter. Finite Fields. Number 20 in Encyclopedia of Mathematics and its Applications. Addison-Wesley, first edition, 1983.
K. Matsui and K. Tanaka. Video-Stenography: How to embed a Signature in a Picture. IMA Intellectual Property Proceedings, 1(1):187–205, January 1994.
W. Meier and O. Staffelbach. The self shrinking generator. In R.E. Blahut et al, editor, Communications and Cryptography: Two sides of One Tapestry, pages 287–295. Kluwer Academic Publishers, 1994.
B. Pfitsmann and M. Schunter. Asymmetric fingerprinting. In U. Maurer, editor, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pages 84–95. Springer, 1996.
R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. Towards a robust digital watermark. In S.Z. Li, D.P. Mital, E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pages 504–508. Springer, 1995.
N. Morimo W. Bender, D. Gruhl. Techniques for data hiding. In Proceedings of the SPIE, February 1995. San Jose CA.
J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In Peter Paul Klaus Brunnstein, editor, KnowRight 1995, Schriftenreihe der sterreichischen Computer Gesellschaft, Band 82, pages 242–251. Oldenbourg Verlag, 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Augot, D., Delaigle, J.F., Fontaine, C. (1998). DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system. In: Quisquater, JJ., Deswarte, Y., Meadows, C., Gollmann, D. (eds) Computer Security — ESORICS 98. ESORICS 1998. Lecture Notes in Computer Science, vol 1485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055867
Download citation
DOI: https://doi.org/10.1007/BFb0055867
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65004-1
Online ISBN: 978-3-540-49784-4
eBook Packages: Springer Book Archive