Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, and the scalability to large-scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data, which permits to efficiently combine watermarking and cryptographic techniques.
Watermarking in the Encrypted Domain / Barni, Mauro; Piva, Alessandro; Bianchi, Tiziano - In: Information Hiding / Katzenbeisser S., Petitcolas F.. - STAMPA. - [s.l] : Artech House, 2016. - ISBN 978-1-60807-928-5. - pp. 261-286
Watermarking in the Encrypted Domain
BIANCHI, TIZIANO
2016
Abstract
Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, and the scalability to large-scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data, which permits to efficiently combine watermarking and cryptographic techniques.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2632198
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo