Conference Paper

A New Watermarking Protocol of Copyright Protection

Beijing University of Posts and Telecommunication, China
DOI: 10.1109/IIH-MSP.2006.264960 Conference: Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP '06. International Conference on
Source: IEEE Xplore


Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To address this issue, a new watermarking protocol proposed in this article uses three watermarks in structure. By introducing the CA, the signature and the timestamp, the protocol sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem. Because ICP and customer cannot remove the watermark from watermarked digital content, and neither the copyrighter nor the ICP can fabricate piracy, the proposed protocol can trace piracy. With the proxy signature, the digital content transaction without the Third party is performed in which there are only two participants, the seller and the buyer.

5 Reads
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. In this paper we present a detailed survey of existing and newly proposed steganographic and watermarking techniques. We classify the techniques based on different domains in which data is embedded. We limit the survey to images only.
    Industrial Informatics, 2005. INDIN '05. 2005 3rd IEEE International Conference on; 09/2005
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: There has been a rapid development in the growth of multimedia and communications in the past few years. With the widespread use of the networks, intellectual properties can be obtained, reproduced or redistributed easily. This creates a high demand for content protection techniques. Watermarking, one of the most efficient ways to protect the digital properties has won more and more concern in recent years. This paper reviews several aspects about digital watermarking. Among them, we mainly focus on three processes of digital watermarking. Also, we will examine the properties of watermarking and several applications of watermarking. At last, this paper will discuss the differences between watermarking, steganography and cryptography.
    Information and Communication Technologies, 2005. ICICT 2005. First International Conference on; 09/2005
  • [Show abstract] [Hide abstract]
    ABSTRACT: Watermarking has been invoked as a tool for the protection of Intellectual Property Rights (IPR) of multimedia data distributed in digital form. The most important issues to be considered when designing a watermarking-based Electronic Copyright Management System (ECMS) are discussed, and a new system is presented which exploits state-of-the-art watermarking technology to enable IPR protection in open-network environments. The proposed system is an object-oriented one: at any given time, the information needed to prove the legal/illegal use of the data is hidden within the data itself, whereas no attempt is made to trace previous abuses.
    Web Delivering of Music, 2001. Proceedings. First International Conference on; 12/2001


5 Reads
Available from