Fragile watermarking with permutation code for content-leakage in digital rights management system

被引:3
|
作者
Ta Minh Thanh [1 ,2 ]
Iwakiri, Munetoshi [3 ]
机构
[1] Tokyo Inst Technol, Dept Math & Comp Sci, Meguro Ku, 2-12-2 Ookayama, Tokyo 1528552, Japan
[2] Le Quy Don Tech Univ, Dept Network Secur, 236 Hoang Quoc Viet, Hanoi, Vietnam
[3] Natl Def Acad, Dept Comp Sci, 1-10-20 Hashirimizu, Yokosuka, Kanagawa 2398686, Japan
关键词
Digital rights management (DRM); Incomplete cryptography; Invisible fragile watermarking; Permutation code; VIDEO;
D O I
10.1007/s00530-015-0472-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a new scheme of digital rights management (DRM) system employing the fragile watermarking with permutation code for the image distribution via network. General DRM systems are designed to protect the copyright of contents and to trace the source of the illegal distributors based on the user-side watermarking. However, in the typical DRM systems, the original digital contents are temporarily disclosed without the watermarking information inside user's system by the decryption process. Therefore, the user can copy the leaked original content inside the system and illegally redistribute via network without the permission of the content providers. Our work describes the idea of a DRM method which is composed of the incomplete cryptography based on permutation codes and user identification mechanism to control the quality of digital contents. There are two fundamental steps in our proposed cryptography: incomplete encoding and incomplete decoding. These two steps will create the scrambled content that is used as trial content and the watermarked content that is used to prevent unauthorized duplication or business of digital contents, respectively. Experimental results show that the proposed method is suitable for DRM in the network distribution system.
引用
收藏
页码:603 / 615
页数:13
相关论文
共 50 条
  • [1] Fragile watermarking with permutation code for content-leakage in digital rights management system
    Ta Minh Thanh
    Munetoshi Iwakiri
    [J]. Multimedia Systems, 2016, 22 : 603 - 615
  • [2] Digital rights management and watermarking of multimedia content for m-commerce applications
    Hartung, F
    Ramme, F
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2000, 38 (11) : 78 - 84
  • [3] Integration of digital rights management into learning content management system
    Liu, Qingtang
    Yang, Zongkai
    [J]. Computers in Education Journal, 2005, 15 (04): : 87 - 94
  • [4] Integration of digital rights management into learning content management system
    Yang, ZK
    Liu, QT
    Yan, K
    Deng, WT
    Jin, J
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 465 - 469
  • [5] Content-fragile watermarking based on content-based digital signatures
    Dittmann, J
    Steinmetz, A
    Steinmetz, R
    [J]. INTERACTIVE DISTRIBUTED MULTIMEDIA SYSTEMS AND TELECOMMUNICATION SERVICES, 1999, 1718 : 259 - 272
  • [6] Oblivious Content Distribution System to Advantage Digital Rights Management
    Prihandoko, Antonius Cahya
    Ghodosi, Hossein
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017,
  • [7] Benchmarking of image watermarking algorithms for digital rights management
    Macq, B
    Dittmann, J
    Delp, EJ
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (06) : 971 - 984
  • [8] Digital rights management and content development
    Calvert, P
    [J]. ONLINE INFORMATION REVIEW, 2004, 28 (02) : 165 - 165
  • [9] Content-based digital signature for motion pictures authentication and content-fragile watermarking
    Dittmann, J
    Steinmetz, A
    Steinmetz, R
    [J]. IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, 1999, : 209 - 213
  • [10] Content-based digital signature for motion pictures authentication and content-fragile watermarking
    Dittmann, Jana
    Steinmetz, Arnd
    Steinmetz, Ralf
    [J]. International Conference on Multimedia Computing and Systems -Proceedings, 1999, 2 : 209 - 213