Techniques and Applications of Digital Watermarking and Content Protection
This book is the result of research on issues of the protection of
intellectual property (particularly multimedia data) and the limits
thereof conducted by my colleagues Michael
Arnold and Martin
Schmucker and
myself (although in the latter case on and off) over the last ten years.
This book is not only an attempt at presenting an introduction to number of
techniques for such mechanisms, primarily focused on digital watermarking
but also including other mechanisms; it strives to place these
techniques into a context provided by application scenarios and their
requirements as well as the legal and - to a modest
extent - ethical contexts all such research and development must be
conducted in. Given this premise, particular attention is paid to clearly
showing the limits of the currently known techniques and algorithms within
the particular context of intellectual property protection.
We hope that the present book can serve as both an introduction to the
field to both students and researchers providing sufficient background for
further studies and as guidance for the assessment and - if necessary -
selection of technical means for intellectual property protection.
Contents
- Introduction
- The Origins of Copyright Protection
- The Protection of Intellectual Property through Technical
Means
- Integrity and Authenticity
- Digital Watermarking
- Rationale
- Digital Watermarking and Cryptography
- Steganography
- Digital watermarking
- First Generation Approaches
- Basic principles of watermarking
- Terminology
- First methods
- Beyond the First Generation
- Applications of Digital Watermarking
- Usage-Specific Requirements
- Copyright Protection
- Misappropriation by other content providers
- Illicit use by end users
- Annotation Watermarking
- Fingerprinting
- Automatic Playlist Generation for Rights Verification
- Multimedia Authentication
- Watermarking for Copy Protection
- Digital Watermarking for Still Images
- Classification and Application Requirements
- Photographic and Photorealistic Images
- Traditional watermarking methods
- Watermarking methods dealing with geometric distortions
- Content-based watermarking methods
- Binary and halftoned images
- Summary
- Digital Watermarking for Audio Data
- Requirements and Design
- Removal manipulations and attacks
- Misalignment manipulations and attacks
- Psychoacoustic Facts and Models
- Critical bands
- Masking effects
- Psychoacoustic model MPEG 1 layers I and II
- Perceptual Audio Watermarking
- Spectral weighting
- Algorithms.
- LSB coding
- Embedding watermarks into the phase
- Echo hiding
- Watermarking of compressed audio data
- Spread-spectrum audio watermarking
- Audio watermarking via the patchwork technique
- Mechanisms against desynchronization manipulations
- Digital Watermarking for Other Media
- Digital Watermarking for Video Data
- Application requirements
- Algorithms
- Digital Watermarking for Three-Dimensional Data
- Application requirements
- Data representation
- Operations and attacks
- Algorithms
- Quality
- Digital Watermarking for Two-Dimensional Geometry Data
- Digital Watermarking for Formatted Text
- Application requirements
- Algorithms
- Music Scores
- Application requirements
- Algorithms
- Attacks and Benchmarks of Digital Watermarks
- Threats and Risk Analysis
- Attacks
- Classification of attacks
- Removal attacks and manipulation
- Desynchronization attacks
- Embedding attacks
- Detection attacks
- Quality Evaluation of Watermarked Objects
- Psychophysical methods
- Audio data
- Image data
- Video data
- Benchmarking
- Concepts
- Automatic evaluation of watermarking algorithms
- Other Content Protection Mechanisms
- Copy and Usage Protection Schemes
- Analog Media Protection
- Fingerprinting
- Offline Digital Content Protection
- Cryptographic mechanisms
- Integrated Content Protection Solutions
- Digital Rights Management
- The Digital Transmission Content Protection Specification
- The Trusted Computing Platform Alliance system architecture
- The CIPRESS system
- Pragmatic aspects of digital rights management
- Tamper-Protection
- Techniques for software tamper protection
- Techniques for hardware tamper protection
- Conclusion
- Digital Rights Management Systems
- Privacy, competition, and freedom of speech
- DRM in commercial environments
- Digital Watermarking
- Outlook
|
This page and all contents (unless otherwise noted) are
Copyright © 2002-2003 by Stephen D. Wolthusen
All rights reserved.
|