Title :
Fragile fingerprinting using permutation code for digital image
Author :
Thanh, Ta Minh ; Iwakiri, Munetoshi ; Thanh, Nguyen
Author_Institution :
Dept. of Comput. Sci., Tokyo Inst. of Technol., Tokyo, Japan
Abstract :
In the present digital world, Digital Rights Management (DRM) is essential to enforce persistent data protection right from the moment it is published. In spite of a need for DRM there are significant weaknesses in the current technology. Generally, DRM system is achieved with individual function modules of cryptography, fingerprinting and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the elemental idea of a DRM method which is composed of an incomplete cryptography based on permutation codes and user identification mechanism to control the quality of digital contents. There are two fundamental steps in our proposed cryptography: incomplete encoding and incomplete decoding. These two steps will create the scrambled content that is used as trial content and the fingerprinted content is used to prevent unauthorized duplication or business of digital contents, respectively. Experimental results on standard JPEG format show that the proposed method is suitable for DRM in the network distribution system.
Keywords :
authorisation; cryptography; data protection; digital rights management; image coding; DRM system; decryption process; digital content business prevention; digital content quality control; digital image; digital rights management; digital world; fingerprinted content; function modules; incomplete cryptography; incomplete decoding; incomplete encoding; network distribution system; permutation code; persistent data protection right; scrambled content creation; standard JPEG format; system flow; unauthorized duplication prevention; user identification mechanism; Cryptography; Data mining; Databases; Decoding; Encoding; Transform coding; Watermarking; DRM (Digital Rights Management); Fingerprinting; Incomplete Cryptography; Permutation Codes; Watermarking;
Conference_Titel :
Signal Processing and Information Technology (ISSPIT), 2012 IEEE International Symposium on
Conference_Location :
Ho Chi Minh City
Print_ISBN :
978-1-4673-5604-6
DOI :
10.1109/ISSPIT.2012.6888814