Fragile watermarking with permutation code for content-leakage in digital rights management system

In this paper, we present a new scheme of digital rights management (DRM) system employing the fragile watermarking with permutation code for the image distribution via network. General DRM systems are designed to protect the copyright of contents and to trace the source of the illegal distributors based on the user-side watermarking. However, in the typical DRM systems, the original digital contents are temporarily disclosed without the watermarking information inside user’s system by the decryption process. Therefore, the user can copy the leaked original content inside the system and illegally redistribute via network without the permission of the content providers. Our work describes the idea of a DRM method which is composed of the incomplete cryptography based on permutation codes and user identification mechanism to control the quality of digital contents. There are two fundamental steps in our proposed cryptography: incomplete encoding and incomplete decoding. These two steps will create the scrambled content that is used as trial content and the watermarked content that is used to prevent unauthorized duplication or business of digital contents, respectively. Experimental results show that the proposed method is suitable for DRM in the network distribution system.

[1]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[2]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[3]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[4]  Chih-Yang Lin,et al.  Joint fingerprinting and decryption with noise-resistant for vector quantization images , 2012, Signal Process..

[5]  Sang Uk Lee,et al.  Temporal Feature Modulation for Video Watermarking , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Ta Minh Thanh,et al.  Robust semi-blind video watermarking based on frame-patch matching , 2014 .

[7]  J. Alex Halderman,et al.  Evaluating New Copy-Prevention Techniques for Audio CDs , 2002, Digital Rights Management Workshop.

[8]  Ta Minh Thanh,et al.  A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature , 2013, Multimedia Systems.

[9]  Jeffrey A. Bloom Security and rights management in digital cinema , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[10]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Kannan Karthik,et al.  Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection , 2007, Int. J. Netw. Secur..

[12]  Bart De Decker,et al.  Towards a software architecture for DRM , 2005, DRM '05.

[13]  Itaru Kaneko Survey of the Development of DRM towards Mobile Internet Era and Proposal of Nobel Security Model , 2013 .

[14]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[15]  Hefei Ling,et al.  Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.

[16]  Chia-Hao Chang,et al.  Prediction-based watermarking schemes using ahead/post AC prediction , 2010, Signal Process..

[17]  Wataru Kameyama,et al.  A proposal on open DRM system coping with both benefits of rights-holders and users , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[18]  Dirk Günnewig,et al.  Digital Rights Management , 2005, Wirtsch..

[19]  Dongkyoo Shin,et al.  An efficient methodology for multimedia digital rights management on mobile handset , 2004, IEEE Trans. Consumer Electron..

[20]  Ta Minh Thanh,et al.  Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights Management , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[21]  Frank Hartung,et al.  Watermarking of multimedia content for m-commerce applications , 2000 .

[22]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[23]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[24]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.