Abstract
This paper* presents a new approach for the copyright protection of digital images transmitted over the Internet. Current watermark techniques emphasise the robustness of digital watermarks only. In addition to being robust, our approach uses cryptographic protocols and public key techniques to ensure the legal binding of spread spectrum based watermark methods. Our approach allows legal action even if a watermark is not found because ownership is legally registered. We show that the copyright problem can be reduced in its complexity if the copyright verification process is associated with the consumer side of the commercial digital image distribution process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Robert A. Cinque, “Making Cyberspace Safe for Copyright: The Protection of Electronic Works in a Protocol to the Berne Convention”, 18 FORDHAM INT’L L.J., 1995, citing BerneConvention art 7(6).
Scott Craver, Nasir Memon, Boon-Lock Yeo and Minerva Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?”, IBM Research Report, RC 20509, July 25, 1996.
ISO/IEC CD International Standard 11770–3 “Information technology- Security techniques-Key management”, Part 3: Mechanisms using asymmetric techniques, 1994.
Martin Kutter and Frederic Jordan, “Digital Signatures of Color Images using Amplitude Modulation”, SPIE-EI97 Proceedings, 1997.
I. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio and Video”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.
Joseph J.K. Ó Ruanaidh and Thierry Pun, “Rotation, Scale and Translation Invariant Digital Image Watermarking”, Signal Processing, January 1997.
Birgit Pfitzmann, Ross Anderson (Ed.), “Information Hiding”, “Information Hiding Terminology”, First International Workshop, Cambridge, UK, May/June, 1996, Proceedings, Springer, Lecture Notes in Computer Science, 1174.
I. Pitas, “A method for Signature Casting on Digital Images”, Proceedings of the IEEE Int. Conf. on Image Processing, ICIP-96, Lausanne Switzerland, 1996.
Bruce Schneier, “Applied Cryptography”, John Wiley and Sons Inc., 1994.
A. Aziz, “SKIP extension for Perfect Forward Secrecy”, Internet draft, work in progress, February 1996.
A. Freier and P. Karlton and P. Kocher, “SSL Version 3.0”, Netscape Communications, Version 3.0, November 1996.
Copyright Act of the United States, Section 106, 1. 3. 1995, http://lcweb.loc.gov/copyright
R. Housley, D. Solo, and W. Ford, IETF: PKI Working Group (PKIX),: X.509 Certificate and CRL Profile, “Internet Public Key Infrastructure Parti”, 03. 01. 1997.
J. Zhao and E. Koch, “Embedding Robust Labels Into Images For Copyright Protection”, Proc. Of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden
About this chapter
Cite this chapter
Herrigel, A., Perrig, A., Ruanaidh, J.J.K.Ó. (1997). A Copyright Protection Environment for Digital Images. In: Müller, G., Rannenberg, K., Reitenspieß, M., Stiegler, H. (eds) Verläßliche IT-Systeme. DUD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-86842-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-322-86842-8_1
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05594-3
Online ISBN: 978-3-322-86842-8
eBook Packages: Springer Book Archive