Secure Multimedia Authoring with Dishonest Collaborators

  • PDF / 684,007 Bytes
  • 10 Pages / 600 x 792 pts Page_size
  • 87 Downloads / 223 Views

DOWNLOAD

REPORT


Secure Multimedia Authoring with Dishonest Collaborators Nicholas Paul Sheppard School of Information Technology and Computer Science, The University of Wollongong, NSW 2522, Australia Email: [email protected]

Reihaneh Safavi-Naini School of Information Technology and Computer Science, The University of Wollongong, NSW 2522, Australia Email: [email protected]

Philip Ogunbona School of Information Technology and Computer Science, The University of Wollongong, NSW 2522, Australia Email: [email protected] Received 31 March 2003; Revised 16 December 2003 Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, we consider the problem of protecting authors’ intellectual property rights from insiders, such as collaborating authors and producers, who interact with the creative process before publication. We describe the weaknesses of standard proof-of-ownership watermarking approaches against dishonest insiders and propose several possible architectures for systems that avoid these weaknesses. We further show how these architectures can be adapted for fingerprinting in the presence of dishonest insiders. Keywords and phrases: digital watermarking, collaboration, multiple watermarking, proof of ownership, fingerprinting.

1.

INTRODUCTION

Multimedia security research has focused on security of published content, and upon protecting the intellectual property of the content owners and creators from malicious end users. These systems, however, do nothing to resolve intellectual property disputes that arise prior to publication, for example, between collaborating authors. We will consider intellectual property protection in the case where the disputing parties are (or claim to be) involved in the creation stage of the content in dispute. We will specifically consider proof-of-ownership, that is, enabling authors to prove to an arbiter that they were involved in the authoring process. We will also consider how our architectures can be adapted to fingerprinting, that is, enabling authors to determine the identity of an author who has “leaked” a copy of the work without permission from the other authors. Watermarking solutions to the above problems have been proposed in the case where the adversary has access only to the published work, that is, is an outsider. In Section 2, we will describe the weaknesses in these solutions against an adversary who is part of the authoring process—that is, is an insider—who in a na¨ıve protocol may be able to obtain a copy

of the unwatermarked original. While some previous algorithms have considered watermarks for representing the collaborative effort of several contributors [1, 2], protocols by which such watermarked objects are created have not been extensively studied. In Section 3, we will describe several possible protocols for multimedia authoring in the proof-of-ownership setting that avoid the weaknesses in na¨ıve protocols by preventing insi