The problem of digital content piracy is becoming more and more critical, and major content producers are risking seeing their business being drastically reduced because of the ease by which digital contents can be copied and distributed. This is the reason why digital rights management (DRM) is currently garnering much attention from industry and research. Among the various technologies that can contribute to set up a reliable DRM system, data hiding (watermarking) has found an important place due to its potentiality of persistent attaching some additional information to the content itself. In this article, we analyzed the possible use of data hiding technology in DRM systems. The article also gives a brief survey of the main characteristics of the most common data hiding methods such as proof of ownership, watermark, copyright protection, infringement tracking, copy control, and item identification. The article also investigates the different approaches by highlighting critical points of each approach in particular from the point of view of hostile attacks.

Barni, M., F., B. (2004). Data hiding for fighting piracy. IEEE SIGNAL PROCESSING MAGAZINE, 21(2), 28-39 [10.1109/MSP.2004.1276109].

Data hiding for fighting piracy

BARNI, MAURO;
2004-01-01

Abstract

The problem of digital content piracy is becoming more and more critical, and major content producers are risking seeing their business being drastically reduced because of the ease by which digital contents can be copied and distributed. This is the reason why digital rights management (DRM) is currently garnering much attention from industry and research. Among the various technologies that can contribute to set up a reliable DRM system, data hiding (watermarking) has found an important place due to its potentiality of persistent attaching some additional information to the content itself. In this article, we analyzed the possible use of data hiding technology in DRM systems. The article also gives a brief survey of the main characteristics of the most common data hiding methods such as proof of ownership, watermark, copyright protection, infringement tracking, copy control, and item identification. The article also investigates the different approaches by highlighting critical points of each approach in particular from the point of view of hostile attacks.
2004
Barni, M., F., B. (2004). Data hiding for fighting piracy. IEEE SIGNAL PROCESSING MAGAZINE, 21(2), 28-39 [10.1109/MSP.2004.1276109].
File in questo prodotto:
File Dimensione Formato  
01276109.pdf

non disponibili

Tipologia: PDF editoriale
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 714.62 kB
Formato Adobe PDF
714.62 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/17550
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo