Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
Proving Ownership of Digital Content
IH '99 Proceedings of the Third International Workshop on Information Hiding
IEEE Journal on Selected Areas in Communications
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Applied Information Security for m-Commerce and Digital Television Environments
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
A chameleon encryption scheme resistant to known-plaintext attack
Proceedings of the tenth annual ACM workshop on Digital rights management
Architecture of authentication mechanism for emerging t-commerce environments
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part I
Secure watermark embedding through partial encryption
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is the use of digital watermarking to embed additional copyright information within data. However, central servers or certification authorities are required by most current watermarking protocols, thus limiting the wide-spread application of watermarking in electronic commerce applications. We propose a secure, distributed watermarking scheme using trusted, tamperproof hardware. The protocols presented provide support for copyright protection and fingerprinting in a de-centralized fashion. Extensive use of a public-key infrastructure permits the secure exchange of secret keys between trusted devices. The unencrypted, private keys never leave the hardware, rendering them unrecoverable. If adopted, this allows for the establishment of a ubiquitous digital watermarking infrastructure to support and foster e-commerce applications.