skip to main content
article
Free Access

Protecting digital media content

Published:01 July 1998Publication History
First page image

References

  1. 1 Cox, I., Kilian, J., Leighton, T., and Shamoon, T. Secure spread spectrum watermarking for multimedia. Tech. Rep. 95-10, NEC Research Institute, Princeton, N.J., 1995.Google ScholarGoogle Scholar
  2. 2 Friedman, G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Comum. Electron. 39, 4 (Nov. 1993), 905-910.Google ScholarGoogle Scholar
  3. 3 Knox, K., and Wang, S. Digital watermarks using stochastic screens. In Proceedings of SPIE/IS&T Symposium on Electronic Imaging (San Jose, Calif., Jan.), SPIE, Bellingham, Wa., 1997.Google ScholarGoogle Scholar
  4. 4 Magerlein, K., Braudaway, G., and Mintzer, F. Protecting publicly available images with a visible image watermark. In Proceedings of Optical Security and Counterfeit Deterrence Techniques (San Jose, Calif., Feb.). SPIE, Bellingham, Wa., 1996, pp. 126-132.Google ScholarGoogle Scholar
  5. 5 Nikolaidis, N., and Pitas, I. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Atlanta, Ga., May). IEEE Press, 1996, pp. 2,168-2,171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Sarwate, D., and Pursley, M. Cross-correlation properties of pseudorandora and related sequences. Proc. IEEE 68 (May 1980), 593-619.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7 Shamir, A. Method and apparatus for protecting visual information with printed cryptographic watermarks. U.S. patent 5488664, Jan. 1996.Google ScholarGoogle Scholar
  8. 8 Swanson, M., Kobayashi, M., and Tewfik, A. Multimedia data embedding and watermarking technologies. IEEE Proc. 86, 6 (June 1998) 1,064-1,087.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9 Van Schyndel, R., Tirkel, A., and Osborne, C. A digital watermark. In Proceedings of ICIP (Austin, Tex., Nov.). IEEE Press, 1994, pp. 86-90.Google ScholarGoogle Scholar
  10. 10 Wong, P. A watermark for image integrity and ownership verification. In Proceedings of IS&T PIC Conference (Portland, Oreg., May). 1998.Google ScholarGoogle Scholar
  11. 11 Yeung, M., and Mintzer, F. An invisible watermarking technique for image verification. In Proceedings of ICIP (Santa Barbara, Calif., Oct.). IEEE Press, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  12. 12 Zhao, J., and Koch, E. Embedding robust labels into images for copyright protection. In Proceedings of the KnowRight'95 Conference on Intellectual Property Rights and New Technologies (Vienna, Austria, Aug.), 1995, pp. 241-251. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting digital media content

                    Recommendations

                    Reviews

                    Allan Louis Lucke

                    The authors' introduction to this well-written article states that, “thanks to the proliferation of the World Wide Web, a huge amount of multimedia content—text, graphics, images, video and audio—are available for browsing and downloading by millions of users worldwide over the network. As a result, security and copyright issues have become important problems in research and applications. Digital watermarking is applicable in copyright protection, ownership assertion, and integrity checks in multimedia content.” Digital watermarking, like analog watermarking, adds a background pattern to a digital image. The authors probably should have restricted their statements to images rather than encompassing multimedia, because watermarking audio would be somewhat perplexing to a listener and watermarking video would seem like overkill. Nevertheless, they have produced a definitive paper on digital watermarking. It has been done in the scholarly way typical of Communications of the ACM : it is carefully edited and beautifully laid out, with appropriate color and black-and-white illustrations. The references also seem to be appropriate and adequate. A short history of watermarking should have been included. Instead, the authors assume that readers are familiar with such protective and decorative techniques. Additionally, they either omit or give short shrift to alternative protective techniques. In particular, it is common for online art dealers to degrade the quality of images of their products to a common PC monitor resolution in order to discourage illegal copying that would replace buying a quality print from the dealer. The authors freely admit that, regardless of how an image may be digitally watermarked, “no known technique can survive a resourceful and clever attacker.” They also predict “many new watermarking approaches and applications in the near future.” We shall see. Anyone interested in Internet commerce protections would do well to read this paper.

                    Access critical reviews of Computing literature here

                    Become a reviewer for Computing Reviews.

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Communications of the ACM
                      Communications of the ACM  Volume 41, Issue 7
                      July 1998
                      112 pages
                      ISSN:0001-0782
                      EISSN:1557-7317
                      DOI:10.1145/278476
                      Issue’s Table of Contents

                      Copyright © 1998 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 July 1998

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader