DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system
This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Diffie-Hellman (DH) protocol and Trusted Third Parties (TTP).
This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.
KeywordsIPR protection watermarking Key exchange Aquarelle multimedia distributed system
Unable to display preview. Download preview PDF.
- 1.J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman. Electronic marking and identification techniques to discourage document copying. In IEEE INFOCOM’94 — Networking for global communications, 1994.Google Scholar
- 2.F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg. Watermarking digital images for copyright protection. Image Processing and its Applications, pages 326–330, 1995. July.Google Scholar
- 3.D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In D. Coppersmith, editor, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pages 452–564. Springer, 1995.Google Scholar
- 4.G. W. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly-available images with a visible image watermark. Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996.Google Scholar
- 5.I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, 1995.Google Scholar
- 8.R. C. Dixon. Spread Spectrum with Commercial Applications. Wiley, third edition edition, 1994.Google Scholar
- 9.David Kahn. The history of cryptography. In R. Anderson, editor, Information Hiding, number 1174 in Lecture Notes in Computer Science, pages 1–5. Springer, 1996.Google Scholar
- 10.E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Proc of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995.Google Scholar
- 11.R. Lidl and H. Niederreiter. Finite Fields. Number 20 in Encyclopedia of Mathematics and its Applications. Addison-Wesley, first edition, 1983.Google Scholar
- 12.K. Matsui and K. Tanaka. Video-Stenography: How to embed a Signature in a Picture. IMA Intellectual Property Proceedings, 1(1):187–205, January 1994.Google Scholar
- 13.W. Meier and O. Staffelbach. The self shrinking generator. In R.E. Blahut et al, editor, Communications and Cryptography: Two sides of One Tapestry, pages 287–295. Kluwer Academic Publishers, 1994.Google Scholar
- 14.B. Pfitsmann and M. Schunter. Asymmetric fingerprinting. In U. Maurer, editor, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pages 84–95. Springer, 1996.Google Scholar
- 15.R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. Towards a robust digital watermark. In S.Z. Li, D.P. Mital, E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pages 504–508. Springer, 1995.Google Scholar
- 16.N. Morimo W. Bender, D. Gruhl. Techniques for data hiding. In Proceedings of the SPIE, February 1995. San Jose CA.Google Scholar
- 17.J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In Peter Paul Klaus Brunnstein, editor, KnowRight 1995, Schriftenreihe der sterreichischen Computer Gesellschaft, Band 82, pages 242–251. Oldenbourg Verlag, 1995.Google Scholar