Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, and the scalability to large-scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data, which permits to efficiently combine watermarking and cryptographic techniques.

Watermarking in the Encrypted Domain / Barni, Mauro; Piva, Alessandro; Bianchi, Tiziano - In: Information Hiding / Katzenbeisser S., Petitcolas F.. - STAMPA. - [s.l] : Artech House, 2016. - ISBN 978-1-60807-928-5. - pp. 261-286

Watermarking in the Encrypted Domain

BIANCHI, TIZIANO
2016

Abstract

Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, and the scalability to large-scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data, which permits to efficiently combine watermarking and cryptographic techniques.
2016
978-1-60807-928-5
Information Hiding
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2632198
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo