Robust Protocols for Proving Ownership of Images
نویسندگان
چکیده
We explore the problem of proving ownership or origin of multimedia content like image / video or audio signals through watermarking. The need for watermarking arises out of the unsuitability of present copyright laws for claiming ownership of digital content. Watermarking schemes however, are threatened by counterfeit attacks, which primarily use the freedom available in the choice of signature or choice of the watermarking method. A restrictive protocol for watermarking could go a long way in rendering counterfeit attacks extremely difficult. We suggest a comprehensive protocol that makes it possible for the true owner to claim ownership unambiguously, while making it extremely difficult for a pirate to do so.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملSound proofs of authorship and distribution of digital rights
Secure distribution and protection of digital content has become a crucial problem in the Digital Millennium. Digital Rights Management (DRM) systems are technical means for the secure distribution, processing and consumption of digital content. The major driving force behind the research, development and deployment of DRM systems are the music and film industries, seeking for technical means t...
متن کاملWatermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
Various digital watermarking techniques have been proposed in recent years as methods to protect the copyright of multimedia data. However, as pointed out by the IBM research group, the rightful ownership problem has not been properly solved. Currently, there are two proposals to solve the ownership problem. Unfortunately, one proposal lacks a formal proof and the other can be easily defeated. ...
متن کاملRFID Ownership Transfer with Positive Secrecy Capacity Channels
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...
متن کامل