Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement

With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an individual with no risk and little cost in any situation in public or private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual's private life to the public. Social and legal measures are increasingly taken to deal with this problem, but they are hard to enforce in practice. In this paper, we proposed a model for privacy infrastructures aiming for the distribution channel such that as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action in the first place. The implementation issues of the proposed protocol are discussed. Digital rights management techniques are applied in our proposed infrastructure, and data identification techniques such as digital watermarking and robust perceptual hashing are proposed to enhance the distributed content identification.

[1]  Andreas Uhl,et al.  Robust Hash Functions for Visual Data: An Experimental Comparison , 2003, IbPRIA.

[2]  M. Trimeche,et al.  Digital rights management for visual content in mobile applications , 2004, First International Symposium on Control, Communications and Signal Processing, 2004..

[3]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[4]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[7]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Anastasios Tefas,et al.  A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[10]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[11]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[12]  Nazim Fatès,et al.  Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.

[13]  Vishal Monga,et al.  Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[14]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2004 .

[15]  Renato Ianella Open Digital Rights Language (ODRL) , 2007 .

[16]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[17]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[18]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[19]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[20]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[21]  Chi-Hung Chi,et al.  Survey on the Technological Aspects of Digital Rights Management , 2004, ISC.

[22]  Frank Hartung,et al.  Watermarking of multimedia content for m-commerce applications , 2000 .

[23]  Larry Korba,et al.  Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.

[24]  Cordelia Schmid,et al.  A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[26]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[27]  Neil J. Hurley,et al.  A framework for soft hashing and its application to robust image hashing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[28]  Edward J. Delp,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[29]  Stefan Katzenbeisser,et al.  Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.

[30]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..