IBM Systems Journal
Network text editor (NTE): A scalable shared text editor for the MBone
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Automatic Detection of a Watermarked Document Using a Private Key
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Fast public-key watermarking of compressed video
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, we consider the problem of protecting authors' intellectual property rights from insiders, such as collaborating authors and producers, who interact with the creative process before publication. We describe the weaknesses of standard proof-of-ownership watermarking approaches against dishonest insiders and propose several possible architectures for systems that avoid these weaknesses. We further show how these architectures can be adapted for fingerprinting in the presence of dishonest insiders.