OSA's Digital Library

Optics Express

Optics Express

  • Editor: J. H. Eberly
  • Vol. 3, Iss. 12 — Dec. 7, 1998
  • pp: 478–484

Intellectual property protection systems and digital watermarking

Jack Lacy, Schuyler R. Quackenbush, Amy R. Reibman, and James H. Snyder  »View Author Affiliations

Optics Express, Vol. 3, Issue 12, pp. 478-484 (1998)

View Full Text Article

Enhanced HTML    Acrobat PDF (71 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



Adequate protection of digital copies of multimedia content - both audio and video - is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining high-fidelity reproduction. If distribution of these algorithms is controlled, cleartext uncompressed content is still protected by its size. However, once the compression algorithms are generally available cleartext content becomes extremely vulnerable to piracy. In this paper we explore the implications of this vulnerability and discuss the use of compression and watermarking in the control of piracy.

© Optical Society of America

OCIS Codes
(070.6020) Fourier optics and signal processing : Continuous optical signal processing
(100.2000) Image processing : Digital image processing

ToC Category:
Focus Issue: Digital watermarking

Original Manuscript: October 30, 1998
Published: December 7, 1998

Jack Lacy, Schuyler Quackenbush, Amy Reibman, and James Snyder, "Intellectual property protection systems and digital watermarking," Opt. Express 3, 478-484 (1998)

Sort:  Journal  |  Reset  


  1. M. Bosi, K. Brandenburg, S. Quackenbush, L. Fielder, K. Akagiri, H. Fuchs, M. Dietz, J. Herre, G. Davidson, Y. Oikawa, "ISO/IEC MPEG-2 Advanced Audio Coding," presented at the 101 st Convention of the Audio Engineering Society, preprint 4382, Nov. 1996.
  2. D. Aucsmith, "Tamper Resistant Software," in Proceedings of the First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 317-334, May/June, (1996). [CrossRef]
  3. M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, 164-173 (1996).
  4. D. Boneh, J. Shaw, "Collusion-secure Fingerprinting for Digital Data," Crypto 95, LNCS 963, Springer-Verlag, Berlin, pp. 452-465 (1995).
  5. I. J. Cox and J.M.G. Linnartz, "Public Watermarks and Resistance to Tampering," Proceedings of the Fourth International Conference on Image Processing, Santa Barbara CA, October (1997).
  6. F. Hartung and B. Girod, "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain," Proc. IEEE ICASSP, 2621-2624, April (1997).
  7. "Cryptolope Container Technology," an IBM White Paper, http://www.cryptolope.ibm.com/white.htm.
  8. International Federation of Phonograph Industries, Request for Proposals.
  9. Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207- 226, May/June, (1996).
  10. J. Lacy, D. P. Maher, and J. H. Snyder, "Music on the Internet and the Intellectual Property Protection Problem," Proc. International Symposium on Industrial Electronics, Guimaraes, Portugal, July (1997).
  11. J. Lacy, S. Quackenbush, A. R. Reibman, D. Shur, and J. H. Snyder, "On combining watermarking with perceptual coding," Int. Conf. Acoustics, Speech, and Sig. Proc., May (1998).
  12. O. Sibert, D. Bernstein, D. Van Wie, "Securing the Content, Not the Wire, for Information Commerce," http://www.intertrust.com/architecture/stc.html.
  13. J. Smith, B. Comisky, "Modulation and Information Hiding in Images," Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., 207-226, May/June, (1996). [CrossRef]
  14. http://www.research.att.com/~srq/OpticsExpress

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Figure 1.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited