Advanced techniques for dispute resolving and authorship proofs on digital works
نویسندگان
چکیده
Digital watermarking is a promising technology for protecting intellectual property rights on digital content. Resolving authorship-disputes was one of the first and most propelling applications of robust digital watermarks, and much research effort has gone into protocols for resolving authorship-disputes by means of digital watermarks. Unfortunately, previous proposals lack formal definitions of their trust model, their assumptions, and requirements they should fulfill. This lack of formal definitions makes security proofs for such protocols impossible and many dispute resolving protocols, claimed to be secure, can be shown to be insecure. In this paper we set off to rigorously defining dispute resolving schemes based on a reasonable formal definition of “authorship”. Building on this formal fundament, we analyze the most important proposals for dispute resolving, and discuss their connection to our authorship model. We show that existing proposals suffer from two major problems: First, they require an unnecessary high level of trust in the dispute resolving party. The second and even more serious is that the winner of the dispute is not guaranteed to be the rightful author of the disputed work (conclusiveness problem). As solutions, we propose dispute resolving schemes based on zero-knowledge watermark detection and asymmetric watermarking schemes.
منابع مشابه
Verifying the Authorship of Saikaku Ihara’s Arashi ha Mujyō Monogatari in Early Modern Japanese Literature: A Quantitative Approach
This study focuses on Arashi ha Mujyō Monogatari (“The Tale of Transient Popular Kabuki Actor Arashi’s Life”; 1688), a novel from the early modern Japanese literature, written by Saikaku Ihara (1642–93). It is a first work of a Kabuki actor’s life in Japan (Kabuki is a traditional stage arts performed exclusively by male actors with the accompaniment of live music and songs). Then we will exami...
متن کاملSound proofs of authorship and distribution of digital rights
Secure distribution and protection of digital content has become a crucial problem in the Digital Millennium. Digital Rights Management (DRM) systems are technical means for the secure distribution, processing and consumption of digital content. The major driving force behind the research, development and deployment of DRM systems are the music and film industries, seeking for technical means t...
متن کاملA note on an identity-based ring signature scheme with signer verifiability
Recently, Herranz presented an identity-based ring signature scheme featuring signer verifiability where a signer can prove that he or she is the real signer by releasing an authorship proof. In this paper we show that this scheme is vulnerable to a key recovery attack in which a user’s secret signing key can be efficiently recovered through the use of two known ring signatures and their corres...
متن کاملA Computational Model for Watermark Robustness
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or watermarking. Example applications are dispute resolving, proof of ownership, (asymmetric/anonymous) fingerprinting and zero-knowledge watermark detection. The need for formal security definitions of watermarking schemes is manifold, whereby the core need is to provide sui...
متن کامل