skip to main content
10.5555/1082290.1082312dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform

Published: 01 January 2005 Publication History

Abstract

The advances in multimedia technologies have created opportunities for Internet pirates, who can copy multimedia documents and illegally distribute them, thus violating the legal rights of document owners or web content providers. Such a situation is an actual threat particularly for web content providers, which often have neither the technical competence nor the economical advantage to directly implement effective security services to combat the unauthorized trading of their distributed multimedia documents. This paper shows how known and widespread web oriented technologies can be exploited to develop a simplified but flexible digital rights management web platform. In particular, XML based technologies are used to implement an "on buyer", adaptive watermarking procedure, while web services are used to implement a web platform by which web service providers can supply copyright protection services on behalf of web content providers in a secure network context. Thus, content providers that exploit the proposed platform can take advantage of a copyright protection system acting as a trusted third party without having to directly implement it. On the other hand, service providers can follow the proposed XML based approach to implement fully in the W3C XSLT language complex watermarking procedures without having to interface native codes with web services frameworks commonly used to develop web platforms.

References

[1]
Amielh, M. & Devillers, S. (2002), Bitstream Syntax Description Language: Application of XML-Schema to Multimedia Content Adaptation, in '11th International World Wide Web Conference', Honolulu, Hawaii, USA.
[2]
Barni, M. & Bartolini, F. (2004), 'Data Hiding for Fighting Piracy', IEEE Signal Processing Magazine, 21(2), 28--39.
[3]
Barni, M., Bartolini, F. & Furon, T. (2003), 'A general framework for robust watermarking security', Signal Processing, 83(10), 2069--2084.
[4]
Brunner, R., Cohen, F. et al. (2001), Java Web Services Unleashed, SAMS Publishing.
[5]
Chen, B. & Wornell, G. (2001), 'Quantization index-modulation: a class of provably good methods for digital watermarking and information embedding', IEEE Transaction on Information Theory, 47(4), 1423--1443.
[6]
Cox, I., Bloom, J. & Miller, M. (2001), Digital Water-marking: Principles & Practice, Morgan Kaufman.
[7]
Cox, I., Kilian, J., Leighton, F. & Shamoon, T. (1997), 'Secure spread spectrum watermarking for multimedia', IEEE Transaction on Signal Processing, 6(12), 1673--1687.
[8]
Craver, S., Memon, N., Yeo, B.-L. & Yeung, M. (1998), 'Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications', IEEE Journal on Selected Areas in Communications (Special issue on Copyright and Privacy Protection) 16(5), 573--586.
[9]
Fei, C., Kundur, D. & Kwong, R. H. (2004), 'Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression', IEEE Transaction on Image Processing, 13(2), 126--144.
[10]
Hartung, F. & Girod, B. (1997), Digital Water-marking of MPEG-2 Coded Video in the Bitstream Domain, in 'International Conference on Acoustics, Speech, and Signal Processing', Vol. 4, Munich, Germany, pp. 2621--2624.
[11]
Hartung, F., Su, J. K. & Girod, B. (1999), Spread Spectrum Watermarking: Malicious Attacks and Counterattacks, in E. J. Delp & P. W. Wong, eds, 'Security and Watermarking of Multimedia Contents', Proceedings of SPIE, Vol. 3657, pp. 147--158.
[12]
Hartung, F. & Ramme, F. (2000), 'Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications', IEEE Communication Magazine, 38(11), 78--84.
[13]
Lei, Z. & Georganas, N. D. (2002), 'Rate Adaptation Transcoding for Precoded Video Streams', in Proceedings of the 10th ACM international Conference on Multimedia, Juan-les-Pins, France, pp. 127--136.
[14]
Lin, C.-Y., Wu, M., Lui, Y.-M. et al. (2001), 'Rotation, scale, and translation resilient public water-marking for images', IEEE Transaction on Signal Processing, 10(5), 767--782.
[15]
Lubin, J., Bloom, J. & Cheng, H. (2003), Robust, content-dependent, high-fidelity watermark for tracking in digital cinema, in E. J. Delp & P. W. Wong, eds, 'Security and Watermarking of Multimedia Contents V', Proceedings of SPIE, Vol. 5020, pp. 536--545.
[16]
Malvar, H. S. & Florêêncio D. A. F. (2003), 'Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking', IEEE Transaction on Signal Processing, 51(4), 898--905.
[17]
Memon, N. & Wong, P. W. (1998), A Buyer-Seller Watermarking Protocol, in 'IEEE Workshop on Multimedia Signal Processing', Los Angeles, CA, USA, pp. 278--283.
[18]
Moses (2002), Web site of MOSES EC IST project: http://www.crl.co.uk/projects/moses
[19]
Pfitzmann, B. & Waidner, M. (1997), Asymmetric Fingerprinting for Larger Collusions, in '4th ACM Conference on Computer and Communications Security', Zurich, Switzerland, pp. 151--160.
[20]
Trappe, W., Wu, M., Wang, Z. J. & Liu, K. (2003), 'Anti-collusion fingerprinting for multimedia', IEEE Transaction on Signal Processing, 41(4), 1069--1087.
[21]
Wang, Y., Ostermann, J. & Zhang, Y. (2002), Video Processing and Communications, Prentice Hall.
[22]
Zeng, W. & Liu, B. (1999), 'A Statistical Water-mark Detection Technique without Using Original Images for Resolving Rightful Ownerships of Digital Images', IEEE Transaction on Image Processing, 8(11), 1534--1548.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
January 2005
173 pages
ISBN:1920682260

Publisher

Australian Computer Society, Inc.

Australia

Publication History

Published: 01 January 2005

Author Tags

  1. XML
  2. digital rights management
  3. watermarking
  4. web services

Qualifiers

  • Article

Conference

ACSW Frontiers '05
ACSW Frontiers '05: Grid computing and e-research
01 01 2005
New South Wales, Newcastle, Australia

Acceptance Rates

Overall Acceptance Rate 204 of 424 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)9
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media