The “ticket” concept for copy control based on embedded signalling
This application-oriented paper discusses the use of electronic watermarks (also called embedded signaling) for copy control. Playback Control and Copy-Once are described. The ‘ticket concept’ is presented to provide these functionalities. Although the ticket shows similarities with a digital signature, there are essential differences. For instance, the ticket allows typical modifications of the content, which are common practice in transmission, storage and presentation of video. The concept is part of a proposal currently under investigation for standardization of DVD/CPTWG copy control. This paper also compares the ticket concept with other solutions, such as embedding a secondary mark at the recorder and using a signature scheme.
Key wordsProtection of IPR watermarking embedded signaling copy control copy once playback control Copy Generation Management System (CGMS) Digital Versatile Disc (DVD)
Unable to display preview. Download preview PDF.
- 2.I. J. Cox and J.P.M.G. Linnartz, “Public Watermarks and resistance to tampering”, ICIP 97, Santa Barbara, CA, October 1997Google Scholar
- 3.DVD Copy Protection Technical Working Group (CPTWG), DataHiding Sub-Group (DHSG), Call for Proposals for Embedded Signaling, Burbank, CA, May 1997.Google Scholar
- 4.Orange Book, CD R, CD-RW and CD-MO standard, Coordination Office Optical & Magnetic Media, Philips Consumer Electronics, SWA-1, Eindhoven.Google Scholar
- 5.J. Hogan, “Exploiting Modulation Code Redundancy”, invited paper in Proc. Optical Data Storage, Tucson, AR, April 1997, pp. 88–94Google Scholar
- 6.J.P.M.G. Linnartz and M. van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images”, Workshop on Information Hiding, Portland, OR, 15–17 April, 1998.Google Scholar
- 7.G. Itkis, “Copyright Protection, Analysis and Authorization Chains”, Response to DAVIC CFP 7, London, May 1997.Google Scholar
- 8.Maes, “Twin Peaks: The histogram attack on fixed depth image watermarks”, Preliminary Proceeding of the 2nd International Information Hiding Workshop, Portland OR, April 1998Google Scholar