Preview

Dream Place

Good Essays
Open Document
Open Document
722 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dream Place
Protecting multimedia content by digital watermarking
Shan He and Jeffrey Bloom
A joint coding and embedding strategy can enhance the security of electronic media against illegal copying and redistribution.
15 December 2008, SPIE Newsroom. DOI: 10.1117/2.1200811.1341
The advance of networking and digital-signal processing, along with the emergence of peer-to-peer technology, has made content piracy a major problem for copyright holders. Government agencies also face the challenge of protecting highly classified information from unauthorized redistribution. Cryptography can provide piracy protection during the transmission process, but when content is received and decrypted for display it can be illegally copied and redistributed.
Digital watermarking is a promising technology that can provide lifetime protection by adding any traces of piracy to the content. Watermarks can represent information, such as the ID of the recipient and the time and place of delivery, which are transparently embedded into the content, by slightly changing the pixel values of the video frame, for example. This information can later be extracted from an unauthorized copy to identify the source of the leak. Unfortunately, current watermarking schemes are vulnerable to a type of attack, called a collusion attack, launched by a group of users with different copies of the same content.
Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to

You May Also Find These Documents Helpful

  • Good Essays

    Once something is on a computer, it can replicate and move around the world in a heartbeat. Making a million perfect copies takes but an instant – copy of things we want everyone in the world to see, and also copies of things that weren’t meant to be copied at all.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    But the increasing business requirements, explosion of new technologies, the onset of mobile devices and the need to secure assets from malicious intents – the…

    • 1321 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    experience

    • 335 Words
    • 2 Pages

    At issue in the twenty-first century is the trade-off between the necessity of writers, musicians, artists, and movie studios to profit from their work and the free flow of ideas for the public benefit. Movie (and music) industry participants claim that encryption programs are necessary to prevent piracy. Others, however, including the defendants in cases such as Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001), argue that the law should at least allow purchasers of movies, music, and books in digital form to make limited copies for fair use.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.…

    • 928 Words
    • 4 Pages
    Better Essays
  • Good Essays

    New market entrants and substitute products are the two main competitive forces affecting the movie industry. The traditional outlets for movie viewing, theaters, cable networks, and rental locations are all challenged by the new age of the digital industry. The traditional outlets provided a simpler and more productive means for the industry to get compensated for their efforts. The digital means of using web sites to download from the privacy of your own home has made things more convenient to the consumer but is allowing for there to be infringement on the financial compensation to the production companies. There is a limit to the capability of controlling these activities which has caused some distributors to enter into contracts with some digital networks such as YouTube. YouTube is helping to develop a revenue-sharing model with creators to develop a digital fingerprinting technology that will help control the unauthorized use of copyright protected material.…

    • 1311 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    The first step is steganography is that to embed and hiding information is to pass both the secret message and the cover message in to the encoder, inside the encoder, one or several protocols will be implemented to embed the secret information into the cover message.…

    • 2601 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    Abstract-A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by  minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.  Keywords - sensitive data; fake objects; data allocation strategies; I. INTRODUCTION In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. We call owner of the data,…

    • 2743 Words
    • 11 Pages
    Better Essays
  • Best Essays

    Hmood, D. et al. (2012). A New Steganographic Method For Embedded Image In Audio File. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJCSS/volume6/Issue2/IJCSS-633.pdf [Accessed: 17 Feb 2013].…

    • 2772 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Genetic Algorithm

    • 3320 Words
    • 14 Pages

    1. Introduction. Steganography is a branch of information hiding. It embeds the secret message in the cover media (e.g. image, audio, video, etc.) to hide the existence of the message. Steganography is often used in secrete communication. In recent years, many successful steganography methods have been proposed. Among all the methods, LSB (least significant bit) replacing method is widely used due to its simplicity and large capacity. The majority of LSB steganography algorithms embed messages in spatial domain, such as BPCS[?, ?], PVD[?, ?]. Some others, such as Jsteg[?, ?], F5[?], Outguess[?, ?], embed messages in DCT frequency…

    • 3320 Words
    • 14 Pages
    Powerful Essays