DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System

This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Diffie-Hellman (DH) protocol and Trusted Third Parties (TTP). This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.

[1]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[2]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[3]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[4]  Rudolf Lide,et al.  Finite fields , 1983 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[7]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[8]  Birgit Pfitzmann,et al.  Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.

[9]  J. Massey,et al.  Communications and Cryptography: Two Sides of One Tapestry , 1994 .

[10]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[11]  David A. Kahn The history of cryptography , 1996 .

[12]  Andrew Z. Tirkel,et al.  TOWARDS A ROBUST DIGITAL WATERMARK , 1995 .

[13]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[14]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[15]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[16]  Willi Meier,et al.  The Self-Shrinking Generator , 1994, EUROCRYPT.

[17]  David Kahn,et al.  The History of Steganography , 1996, Information Hiding.