Please use this identifier to cite or link to this item:
https://doi.org/10.1109/TIFS.2009.2033229
Title: | Joint watermarking scheme for multiparty multilevel drm architecture | Authors: | Thomas, T. Emmanuel, S. Subramanyam, A.V. Kankanhalli, M.S. |
Keywords: | Chinese remainder theorem Digital rights management Watermarking |
Issue Date: | 2009 | Citation: | Thomas, T., Emmanuel, S., Subramanyam, A.V., Kankanhalli, M.S. (2009). Joint watermarking scheme for multiparty multilevel drm architecture. IEEE Transactions on Information Forensics and Security 4 (4) : 758-767. ScholarBank@NUS Repository. https://doi.org/10.1109/TIFS.2009.2033229 | Abstract: | Multiparty multilevel digital rights management (DRM) architecture involving several levels of distributors in between an owner and a consumer has been suggested as an alternative business model to the traditional two-party (buyer-seller) DRM architecture for digital content delivery. In the two-party DRM architecture, cryptographic techniques are used for secure delivery of the content, and watermarking techniques are used for protecting the rights of the seller and the buyer. The cryptographic protocols used in the two-party case for secure content delivery can be directly applied to the multiparty multilevel case. However, the watermarking protocols used in the two-party case may not directly carry over to the multiparty multilevel case, as it needs to address the simultaneous security concerns of multiple parties such as the owner, multiple levels of distributors, and consumers. Towards this, in this paper, we propose a joint digital watermarking scheme using Chinese remainder theorem for the multiparty multilevel DRM architecture. In the proposed scheme, watermark information is jointly created by all the parties involved; then a watermark signal is generated out of it and embedded into the content. This scheme takes care of the security concerns of all parties involved. Further, in the event of finding an illegal copy of the content, the violator(s) can be traced back. © 2006 IEEE. | Source Title: | IEEE Transactions on Information Forensics and Security | URI: | http://scholarbank.nus.edu.sg/handle/10635/38993 | ISSN: | 15566013 | DOI: | 10.1109/TIFS.2009.2033229 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.