Preview

Dream Place

Good Essays
Open Document
Open Document
722 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dream Place
Protecting multimedia content by digital watermarking
Shan He and Jeffrey Bloom
A joint coding and embedding strategy can enhance the security of electronic media against illegal copying and redistribution.
15 December 2008, SPIE Newsroom. DOI: 10.1117/2.1200811.1341
The advance of networking and digital-signal processing, along with the emergence of peer-to-peer technology, has made content piracy a major problem for copyright holders. Government agencies also face the challenge of protecting highly classified information from unauthorized redistribution. Cryptography can provide piracy protection during the transmission process, but when content is received and decrypted for display it can be illegally copied and redistributed.
Digital watermarking is a promising technology that can provide lifetime protection by adding any traces of piracy to the content. Watermarks can represent information, such as the ID of the recipient and the time and place of delivery, which are transparently embedded into the content, by slightly changing the pixel values of the video frame, for example. This information can later be extracted from an unauthorized copy to identify the source of the leak. Unfortunately, current watermarking schemes are vulnerable to a type of attack, called a collusion attack, launched by a group of users with different copies of the same content.
Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to

You May Also Find These Documents Helpful

  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    6. Petitcolas, Fabian Anderson, Ross J Kuhn, Markus. Attacks on copyright marking systems, in David Aucsmith (Ed), “Information Hiding – A Survey”, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219- 239. And Fabien A. P. Petitcolas. Watermarking schemes evaluation. I.E.E.E. Signal Processing, vol. 17, no. 5, pp. 58–64, September 2000.…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    With the advent of modern technology bypassing check-and-balance systems that are in place to keep people honest have become extremely easy to bypass; for example, in the 1980’s individuals would borrow VHS cassettes and copy them; however, technology has changed and advanced since then, and with more advanced technology more people are using technology to cheat. An example of using modern technology to bypass a check-and-balance system is Napster. Napster began as a service that allowed people to download music for free without purchasing the CD; bypassing the copyright on the music. There were students who copied the music from Napster, who said “everyone else is doing it why can’t I”. (Jones, 2008). Most people who copied VCR tapes, along with those who copied music from Napster, usually did not think that what they were doing was cheating, or stealing; however, by definition it was.…

    • 1766 Words
    • 8 Pages
    Better Essays
  • Good Essays

    New market entrants and substitute products are the two main competitive forces affecting the movie industry. The traditional outlets for movie viewing, theaters, cable networks, and rental locations are all challenged by the new age of the digital industry. The traditional outlets provided a simpler and more productive means for the industry to get compensated for their efforts. The digital means of using web sites to download from the privacy of your own home has made things more convenient to the consumer but is allowing for there to be infringement on the financial compensation to the production companies. There is a limit to the capability of controlling these activities which has caused some distributors to enter into contracts with some digital networks such as YouTube. YouTube is helping to develop a revenue-sharing model with creators to develop a digital fingerprinting technology that will help control the unauthorized use of copyright protected material.…

    • 1311 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Audio Steganography

    • 5008 Words
    • 21 Pages

    Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.…

    • 5008 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    Abstract-A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by  minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.  Keywords - sensitive data; fake objects; data allocation strategies; I. INTRODUCTION In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. We call owner of the data,…

    • 2743 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Genetic Algorithm

    • 3320 Words
    • 14 Pages

    1. Introduction. Steganography is a branch of information hiding. It embeds the secret message in the cover media (e.g. image, audio, video, etc.) to hide the existence of the message. Steganography is often used in secrete communication. In recent years, many successful steganography methods have been proposed. Among all the methods, LSB (least significant bit) replacing method is widely used due to its simplicity and large capacity. The majority of LSB steganography algorithms embed messages in spatial domain, such as BPCS[?, ?], PVD[?, ?]. Some others, such as Jsteg[?, ?], F5[?], Outguess[?, ?], embed messages in DCT frequency…

    • 3320 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    The first step is steganography is that to embed and hiding information is to pass both the secret message and the cover message in to the encoder, inside the encoder, one or several protocols will be implemented to embed the secret information into the cover message.…

    • 2601 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    This projects objective is to reduce digital piracy and tampering, the major problem in digital media .To deals this problem with watermarking using DCT in MATLAB software.Co-curricular activities:…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    experience

    • 335 Words
    • 2 Pages

    At issue in the twenty-first century is the trade-off between the necessity of writers, musicians, artists, and movie studios to profit from their work and the free flow of ideas for the public benefit. Movie (and music) industry participants claim that encryption programs are necessary to prevent piracy. Others, however, including the defendants in cases such as Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001), argue that the law should at least allow purchasers of movies, music, and books in digital form to make limited copies for fair use.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Environmental Analysis

    • 1058 Words
    • 5 Pages

    New technologies permitting on-line music sales, like iTunes, and recording and playing devices like iPod and upcoming cellphone technologies, increase the easy availability and sale of music products. They also allow music companies to avoid the expense of manufacturing and distributing CDs, and sharing sales revenues with retailers. A major downside is that new technologies permit easy copying of music without payment. Technology that can provide copyright protection (e.g., preventing unauthorized copying) may be one solution to this problem.…

    • 1058 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays