A Copyright Protection Environment for Digital Images | SpringerLink
Skip to main content

A Copyright Protection Environment for Digital Images

  • Chapter
Verläßliche IT-Systeme

Part of the book series: DUD-Fachbeiträge ((DUD))

Abstract

This paper* presents a new approach for the copyright protection of digital images transmitted over the Internet. Current watermark techniques emphasise the robustness of digital watermarks only. In addition to being robust, our approach uses cryptographic protocols and public key techniques to ensure the legal binding of spread spectrum based watermark methods. Our approach allows legal action even if a watermark is not found because ownership is legally registered. We show that the copyright problem can be reduced in its complexity if the copyright verification process is associated with the consumer side of the commercial digital image distribution process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5879
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7349
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Robert A. Cinque, “Making Cyberspace Safe for Copyright: The Protection of Electronic Works in a Protocol to the Berne Convention”, 18 FORDHAM INT’L L.J., 1995, citing BerneConvention art 7(6).

    Google Scholar 

  2. Scott Craver, Nasir Memon, Boon-Lock Yeo and Minerva Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?”, IBM Research Report, RC 20509, July 25, 1996.

    Google Scholar 

  3. ISO/IEC CD International Standard 11770–3 “Information technology- Security techniques-Key management”, Part 3: Mechanisms using asymmetric techniques, 1994.

    Google Scholar 

  4. Martin Kutter and Frederic Jordan, “Digital Signatures of Color Images using Amplitude Modulation”, SPIE-EI97 Proceedings, 1997.

    Google Scholar 

  5. I. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio and Video”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.

    Google Scholar 

  6. Joseph J.K. Ó Ruanaidh and Thierry Pun, “Rotation, Scale and Translation Invariant Digital Image Watermarking”, Signal Processing, January 1997.

    Google Scholar 

  7. Birgit Pfitzmann, Ross Anderson (Ed.), “Information Hiding”, “Information Hiding Terminology”, First International Workshop, Cambridge, UK, May/June, 1996, Proceedings, Springer, Lecture Notes in Computer Science, 1174.

    Google Scholar 

  8. I. Pitas, “A method for Signature Casting on Digital Images”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.

    Google Scholar 

  9. Bruce Schneier, “Applied Cryptography”, John Wiley and Sons Inc., 1994.

    Google Scholar 

  10. A. Aziz, “SKIP extension for Perfect Forward Secrecy”, Internet draft, work in progress, February 1996.

    Google Scholar 

  11. A. Freier and P. Karlton and P. Kocher, “SSL Version 3.0”, Netscape Communications, Version 3.0, November 1996.

    Google Scholar 

  12. Copyright Act of the United States, Section 106, 1. 3. 1995, http://lcweb.loc.gov/copyright

  13. R. Housley, D. Solo, and W. Ford, IETF: PKI Working Group (PKIX),: X.509 Certificate and CRL Profile, “Internet Public Key Infrastructure Parti”, 03. 01. 1997.

    Google Scholar 

  14. J. Zhao and E. Koch, “Embedding Robust Labels Into Images For Copyright Protection”, Proc. Of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Günter Müller Kai Rannenberg Manfred Reitenspieß Helmut Stiegler

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Herrigel, A., Perrig, A., Ruanaidh, J.J.K.Ó. (1997). A Copyright Protection Environment for Digital Images. In: Müller, G., Rannenberg, K., Reitenspieß, M., Stiegler, H. (eds) Verläßliche IT-Systeme. DUD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-86842-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-86842-8_1

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05594-3

  • Online ISBN: 978-3-322-86842-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics