𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights

✍ Scribed by Lintian Qiao; Klara Nahrstedt


Book ID
102614300
Publisher
Elsevier Science
Year
1998
Tongue
English
Weight
476 KB
Volume
9
Category
Article
ISSN
1047-3203

No coin nor oath required. For personal study only.

✦ Synopsis


been proposed in recent years as methods to protect the Various digital watermarking techniques have been proposed copyright of multimedia data. There are various waterin recent years as methods to protect the copyright of multimemarking schemes applied to images and several methods dia data. However, as pointed out by Craver et al., the rightful applied to audio and video streams. Among them, a large ownership problem has not been properly solved. Currently, class of the watermarking schemes addresses invisible wathere are two proposals to solve the ownership problem. Unfortermarks. The research and scheme design mainly focus tunately, one proposal lacks a formal proof and the other can on the issues such as perceptual effects-the watermark be easily defeated. In addition, because the purpose of a watershould be invisible and the distortion should be minimized; mark is mainly for protecting the original owner's rights, the robust design-the watermark must be difficult to remove rights of legitimate customers have not been addressed. This and immune to multimedia data operations such as digitalcould eventually defeat the goal of using a watermark to protect to-analog and analog-to-digital conversion, requantization, the owner's copyright. In this paper, we present solutions to both problems: resolution of the rightful ownership problem dithering, resampling, rotation, scaling, cropping. The waand protection of the customer's rights problem. For the rightful termark schemes should also be robust against multipleownership problem, we develop watermarking methods which document attacks.

successfully resolve the ownership of watermarked MPEG However, there are still open problems. One of them, video and/or uncompressed video/image. We introduce specific as pointed out by Craver et al. [13], is how to resolve the requirements in the watermark construction algorithm which rightful ownership of the invisible watermarking schemes. allow us to prove that the proposed schemes are noninvertible; Craver et al. attacked existing watermarking techniques by i.e., the rightful ownership is guaranteed. Furthermore, we deproviding counterfeit watermarking schemes that can be sign customer rights protocols which give legal customers the performed on a watermarked image to allow multiple ability to create their own evidence and prove their legitimate claims of ownerships. We refer to their attacks as the rights to use the watermarked multimedia data. The integration of our watermarking schemes with the customer's rights proto-CMYY attack. The rightful ownership problem is either not cols creates a robust framework toward resolving rightful ownaddressed at all or not addressed properly within current ership and protecting customer's rights.


πŸ“œ SIMILAR VOLUMES


Owner–customer right protection mechanis
✍ Tzung-Her Chen; Du-Shiau Tsai πŸ“‚ Article πŸ“… 2006 πŸ› Elsevier Science 🌐 English βš– 881 KB

Over the past few years, there have been more and more robust watermarking schemes proposed for copyright protection of digital documents. The authors combine cryptography with watermarking to simultaneously address the problems of protecting the owner's copyright and the legal customer's ownership.

Secret and public key image watermarking
✍ Ping Wah Wong; Memon, N. πŸ“‚ Article πŸ“… 2001 πŸ› IEEE 🌐 English βš– 267 KB

We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct