Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology, within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase [15, 4]. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, the scalability to large scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data [28], which permits to efficiently combine watermarking and cryptographic techniques.

Watermarking in the Encrypted Domain / Barni, M.; Piva, A.; Bianchi, T.. - STAMPA. - (2015), pp. 261-286.

Watermarking in the Encrypted Domain

PIVA, ALESSANDRO;
2015

Abstract

Multimedia content protection is with no doubt one of the most important application scenarios for watermarking technology, within those mentioned in Section 1.3. In a content protection scenario, information about the creator, the distributor, the customer, or the licensing terms between these players is embedded into the content itself by means of watermarking. The hidden information can be used later to demonstrate content ownership, content misappropriation or as a proof of purchase [15, 4]. The adoption of digital watermarking for multimedia content protection in realistic scenarios raises a set of important problems, including the possible collusion of malicious customers, the fact that the distribution mechanism may leak sensible information about the customers, the scalability to large scale scenarios. The collusion problem has already been addressed in Chapter 7. In this chapter, we will illustrate possible solutions to the remaining problems. All of the described solutions are based on the possibility of processing encrypted data [28], which permits to efficiently combine watermarking and cryptographic techniques.
2015
978-1-60807-928-5
Information Hiding
261
286
Barni, M.; Piva, A.; Bianchi, T.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1043266
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact