Abstract

In this work, a fragile watermarking method based on incomplete cryptography for copyright protection is proposed. Our proposed method solves the original content leakage problem of the conventional digital rights management (DRM) system, that is, the original contents are temporarily disclosed inside the user’s system. We include the fragile watermarking into the encryption and the decryption of the digital content distribution system via network. Our method can easily control the quality of original content in order to generate the scrambled content for trial before purchasing. Then, when the watermarked content is generated, the user information is simultaneously embedded into the scrambled content. Experimental results with simulation confirmed that our proposed method is successfully applied on the standard JPEG format and it seems to be suitable for real applications.

Highlights

  • Overview Since growth of computers and network technology, digital contents are manipulated by everyone based on the image/video software

  • Our contributions In this paper, we describe a design and implementation of Digital rights management (DRM) technique based on an incomplete cryptography system

  • This section presents some empirical results concerning of lower bits scramble method (LBSM), fragile decryption and watermarking combination (FDWC) on the Joint Photographic Experts Group (JPEG) images

Read more

Summary

Background

Overview Since growth of computers and network technology, digital contents are manipulated by everyone based on the image/video software. The quality of trial contents will be controlled with a watermarked key at the incomplete decoding process, and the user information will be embedded into the incomplete decoded contents simultaneously. According to features of incomplete cryptography, if a set of the decoded keys ki with decoder function D to decode a encoded C are chosen, a set of decoder contents Pi will be created and different from each other. If incomplete cryptography is implemented to construct a distribution system via network, the producer can distinguish the legal user by Pi that is decoded based on key ki. It can specify to trace the source of pirated copies The purpose of this proposed method is to inform the producer about the existence of watermarking which can exactly identify users, and to limit the illegal redistribution in advance

Methods
Results and discussion
Results and analysis
Method
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.