Proceedings ArticleDOI
Watermarking-based copyright protection of Internet-delivered multimedia
Franco Bartolini,Alessandro Piva,Mauro Barni +2 more
- pp 36-42
Reads0
Chats0
TLDR
A new system is presented which exploits state-of-the-art watermarking technology to enable IPR protection in open-network environments and is an object-oriented one: at any given time, the information needed to prove the legal/illegal use of the data is hidden within the data itself, whereas no attempt is made to trace previous abuses.Abstract:
Watermarking has been invoked as a tool for the protection of Intellectual Property Rights (IPR) of multimedia data distributed in digital form. The most important issues to be considered when designing a watermarking-based Electronic Copyright Management System (ECMS) are discussed, and a new system is presented which exploits state-of-the-art watermarking technology to enable IPR protection in open-network environments. The proposed system is an object-oriented one: at any given time, the information needed to prove the legal/illegal use of the data is hidden within the data itself, whereas no attempt is made to trace previous abuses.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Proceedings ArticleDOI
Text based geometric normalization for robust watermarking of digital maps
TL;DR: The peculiarities of digital map images are exploited to develop a watermarking algorithm which is robust against geometric distortions and exhibits an excellent robustness, as is witnessed by the experimental results reported.
Proceedings ArticleDOI
A New Watermarking Protocol of Copyright Protection
TL;DR: A new watermarking protocol proposed in this article uses three watermarks in structure, which sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem.
References
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.
Proceedings ArticleDOI
Review of watermarking and the importance of perceptual modeling
Ingemar J. Cox,Matthew L. Miller +1 more
TL;DR: The desirable characteristics of digital watermarking are outlined and several recent approaches that address these issues are discussed.
Proceedings ArticleDOI
Effective and ineffective digital watermarks
TL;DR: A number of proposed image-watermarking application scenarios are described and form a small number of watermark-application categories, and the desired technical properties of watermarks for each category are discussed.
Related Papers (5)
A Recent Survey on Multimedia and Database Watermarking
Recent trends in image watermarking techniques for copyright protection: a survey
Arkadip Ray,Somaditya Roy +1 more