Affiliation:
1. University of the Basque Country, Spain
Abstract
This chapter shows the most significant approaches developed so far for the distribution of digital contents with copyright protection, highlighting their most interesting features. These proposals may be classified into two categories: on the one hand systems that try to prevent unauthorized uses of the contents, and on the other hand systems whose purpose is to detect unauthorized uses of the contents and to identify involved offenders. This chapter is focused on the systems that fit in the second of these strategies, most of which are based on the use of watermarking techniques. However, watermarks cannot provide a suitable answer to this issue by themselves, but they must be framed into more complex systems, involving the participation of different entities and the use of well defined protocols which establish the exchange of data and contents among these entities. It is important to point out that cryptography is also a key element in all of these systems and protocols.
Reference51 articles.
1. Adelsbach, A., Katzenbeisser, S., & Sadeghi, A. (2002). Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure. In European Signal Processing Conference (EUSIPCO 2002), (Vol. I, pp. 446-449), TESA, France.
2. Adelsbach, A., Katzenbeisser, S., & Veith, H. (2003).Watermarking schemes provably secure against copy and ambiguity attacks. In 3rd ACM Workshop on Digital Rights Management, (pp. 111-119). New York: ACM.
3. Digital rights protection.;M.Atallah;A Quarterly Bulletin of the Computer Society of the IEEE Technical Committee on Data Engineering,2004
4. Biehl, I., & Meyer, B. (1997). Protocols for Collusion-Secure Asymmetric Fingerprinting. In Proc. 14th Annual Symposium on Theoretical Aspect of Computer Science, (LNCS Vol. 1200, pp. 399-412). Berlin: Springer-Verlag.
5. Copy protection for DVD video