Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture

Multiparty multilevel digital rights management (DRM) architecture involving several levels of distributors in between an owner and a consumer has been suggested as an alternative business model to the traditional two-party (buyer-seller) DRM architecture for digital content delivery. In the two-party DRM architecture, cryptographic techniques are used for secure delivery of the content, and watermarking techniques are used for protecting the rights of the seller and the buyer. The cryptographic protocols used in the two-party case for secure content delivery can be directly applied to the multiparty multilevel case. However, the watermarking protocols used in the two-party case may not directly carry over to the multiparty multilevel case, as it needs to address the simultaneous security concerns of multiple parties such as the owner, multiple levels of distributors, and consumers. Towards this, in this paper, we propose a joint digital watermarking scheme using Chinese remainder theorem for the multiparty multilevel DRM architecture. In the proposed scheme, watermark information is jointly created by all the parties involved; then a watermark signal is generated out of it and embedded into the content. This scheme takes care of the security concerns of all parties involved. Further, in the event of finding an illegal copy of the content, the violator(s) can be traced back.

[1]  Hongxia Jin,et al.  Attacks and Forensic Analysis for Multimedia Content Protection , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[2]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[3]  Mohan S. Kankanhalli,et al.  Copyright protection for MPEG-2 compressed broadcast video , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[4]  Stefan Katzenbeisser,et al.  Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Hirofumi Muratani Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring , 2004, Information Hiding.

[6]  Thumrongrat Amornraksa,et al.  Scrambling and key distribution scheme for digital television , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..

[7]  Wu Ye,et al.  Key distribution scheme based on two cryptosystems for hierarchical access control , 2006, 2006 8th International Conference Advanced Communication Technology.

[8]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[9]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.

[12]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[13]  Alan C. Bovik,et al.  Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.

[14]  Bart Preneel,et al.  On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[15]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[16]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[17]  Seong Oun Hwang,et al.  Modeling and implementation of digital rights , 2004, J. Syst. Softw..

[18]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[19]  Mohan S. Kankanhalli,et al.  Secure multimedia content delivery with multiparty multilevel DRM architecture , 2009, NOSSDAV '09.

[20]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[21]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[22]  Chun-I Fan,et al.  Buyer-seller watermarking protocols with off-line trusted third parties , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[23]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[24]  Mohan S. Kankanhalli,et al.  Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.