Abstract

Adequate protection of digital copies of multimedia content - both audio and video - is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining high-fidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.

© Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |

  1. M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, "ISO/IEC MPEG-2 Advanced Audio Coding," presented at the 101 st Convention of the Audio Engineering Society, preprint 4382, Nov. 1996.
  2. D. Aucsmith, "Tamper Resistant Software," in Proceedings of the First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 317-334, May/June, (1996).
    [CrossRef]
  3. M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, 164-173 (1996).
  4. D. Boneh, J. Shaw, "Collusion-secure Fingerprinting for Digital Data," Crypto 95, LNCS 963, Springer-Verlag, Berlin, pp. 452-465 (1995).
  5. I. J. Cox and J.M.G. Linnartz, "Public Watermarks and Resistance to Tampering," Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October (1997).
  6. F. Hartung and B. Girod, "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain," Proc. IEEE ICASSP, 2621-2624, April (1997).
  7. "Cryptolope Container Technology," an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.
  8. International Federation of Phonograph Industries, Request for Proposals.
  9. Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207- 226, May/June, (1996).
  10. J. Lacy, D. P. Maher, and J. H. Snyder, "Music on the Internet and the Intellectual Property Protection Problem," Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July (1997).
  11. J. Lacy, S. Quackenbush, A. R. Reibman, D. Shur, and J. H. Snyder, "On combining watermarking with perceptual coding," Int. Conf. Acoustics, Speech, and Sig. Proc., May (1998).
  12. O. Sibert, D. Bernstein, D. Van Wie, "Securing the Content, Not the Wire, for Information Commerce," http://www.intertrust.com/architecture/stc.html.
  13. J. Smith, B. Comisky, "Modulation and Information Hiding in Images," Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207-226, May/June, (1996).
    [CrossRef]
  14. http://www.research.att.com/~srq/OpticsExpress

Other (14)

M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, "ISO/IEC MPEG-2 Advanced Audio Coding," presented at the 101 st Convention of the Audio Engineering Society, preprint 4382, Nov. 1996.

D. Aucsmith, "Tamper Resistant Software," in Proceedings of the First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 317-334, May/June, (1996).
[CrossRef]

M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, 164-173 (1996).

D. Boneh, J. Shaw, "Collusion-secure Fingerprinting for Digital Data," Crypto 95, LNCS 963, Springer-Verlag, Berlin, pp. 452-465 (1995).

I. J. Cox and J.M.G. Linnartz, "Public Watermarks and Resistance to Tampering," Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October (1997).

F. Hartung and B. Girod, "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain," Proc. IEEE ICASSP, 2621-2624, April (1997).

"Cryptolope Container Technology," an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.

International Federation of Phonograph Industries, Request for Proposals.

Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207- 226, May/June, (1996).

J. Lacy, D. P. Maher, and J. H. Snyder, "Music on the Internet and the Intellectual Property Protection Problem," Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July (1997).

J. Lacy, S. Quackenbush, A. R. Reibman, D. Shur, and J. H. Snyder, "On combining watermarking with perceptual coding," Int. Conf. Acoustics, Speech, and Sig. Proc., May (1998).

O. Sibert, D. Bernstein, D. Van Wie, "Securing the Content, Not the Wire, for Information Commerce," http://www.intertrust.com/architecture/stc.html.

J. Smith, B. Comisky, "Modulation and Information Hiding in Images," Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207-226, May/June, (1996).
[CrossRef]

http://www.research.att.com/~srq/OpticsExpress

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (1)

Figure 1.
Figure 1.

IP protection system

Metrics