Protecting intellectual property rights and the JPEG2000 coding standard (original) (raw)

1. The Necessity of Protection of Digital Media Assets: Problems and Opportunities

2020

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. ABSTRACT Multimedia assets have to be marked steganographically to protect the rights of the owner. Digital watermarks are inserted as a bit sample or digital signal into the data with an embedding algorithm using a secret key. The embedded information is hidden (in low-value bits or least significant bits of picture pixels, or in frequency space) and connected inseparably with the data. For the optimal application of watermark technology a trade-off has to be made between competing criteria such as robustness, non-perceptibility, non-detectability, and security. Most watermark algorithms cannot tackle to attacks. Even friendly attacks in form of usual file modifications can destroy very easily the watermark or falsify it.

Copyright protection of multimedia documents: From theory to application

1999

Transmission, manipulation and storage of images in digital format is rapidly becoming an everyday practice. Desktop publishing, digital libraries, image databases and the World Wide Web are only some of the application areas that are strongly related to digital imaging technology. The new digital, networked environment necessitates the development of robust and trustworthy encryption, authentication and copyright protection techniques. In this paper we describe a general framework for image copyright protection through image watermarking. In particular we present the main features of an e cient watermarking scheme, discuss robustness issues and describe the three main stages of a watermarking algorithm namely watermark generation, embedding and detection.

Multimedia Security and Digital Rights Management Technology

Information Security Policies and Actions in Modern Integrated Systems

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of This chapter appears in the book, Information Security Policies and Actions in Modern Integrated Systems, edited by Mariagrazia Fugini and Carlo Bellettini.

Intellectual property protection systems and digital watermarking

Optics Express, 1998

Adequate protection of digital copies of multimedia content -both audio and video -is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining high-fidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.

Problems and Challenges in Multimedia Networking and Content Protection

2000

The digital networked environment necessitates the development of protection techniquesfor multimedia product access and distribution. This paper refers to protectionschemes for copyright and content originality of multimedia products through invisiblewatermarking. In particular, we present the basic protection schemes and fundamentalconcepts. The elementary partial algorithms, which can consist an overal watermarkingsystem, are given and their basic characteristics are studied. Efficient...