A digital rights management scheme for broadcast video

被引:25
作者
Emmanuel, S
Kankanhalli, MS
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 693798, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 119260, Singapore
关键词
digital rights management; copyright protection; subscriber's rights protection; digital watermarks; digital video broadcasting; video watermarking; pay TV;
D O I
10.1007/s00530-002-0066-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many watermarking techniques have been proposed for digital video and digital broadcast video. In general, they address the seller's or broadcaster's concerns, such as copyright-violation deterrence, copyright-violation detection and copy protection. Some of them provide for data integrity (tamper proofing), which is a shared concern of both subscriber and broadcaster. In all these cases, the watermark generation and embedding is performed or controlled by the seller or broadcaster. Therefore, a broadcaster with malicious intentions could, with manipulation, falsely implicate an innocent subscriber in copyright violation. This could be a major concern for subscribers. In this paper, we propose an integrated solution to manage the broadcaster's copyright and subscriber's false-implication concern (subscriber's rights) for digital video broadcasts. The proposed novel approach makes use of interactive watermarking techniques and protocols to help protect digital rights of all parties involved in video broadcasting.
引用
收藏
页码:444 / 458
页数:15
相关论文
共 35 条
[1]  
ANDERSON R, 1997, LECT NOTES COMPUTER, V1267
[2]  
[Anonymous], 2000, CRYPTOGRAPHY NETWORK
[3]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[4]  
BRISCOE B, 1999, NARK RECEIVER BASED
[5]  
BROWN I, 1999, LECT NOTES COMPUTER, V1736
[6]   A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile [J].
Chou, CH ;
Li, YC .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 1995, 5 (06) :467-476
[7]  
CHU HH, 1999, P SPIE S EL IM SCI T
[8]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[9]  
COX IJ, 2001, DIGITAL WATERMAKING
[10]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586