@inproceedings{6fd2a63e29b34080b715b28287342a3d,
title = "DHWM: A scheme for managing watermarking keys in the aquarelle multimedia distributed system",
abstract = "This paper presents secure architecture and protocols for managing Intellectual Property Rights in distributed content databases in a close environment. The implementation of this architecture is currently being realized in the European project AQUARELLE. Registered users will access on the Internet to high value content through secure servers. The main interest of this paper is protocols and architecture developed for using watermarking technologies, with a clever and efficient key management based on the Difl'ie-Hellman (DH) protocol and Trusted Third Parties (TTP). This paper presents a short survey of watermarking technologies. Next Aquarelle background is specified, along with the chosen watermarking algorithm, which is convenient for the project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman keyexchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.",
keywords = "Aquarelle, IPR protection, Key exchange, Multimedia distributed system, Watermarking",
author = "Daniel Augot and Delaigle, \{Jean Fran{\c c}ois\} and Caroline Fontaine",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1998.; 5th European Symposium on Research in Computer Security, ESORICS 1998 ; Conference date: 16-09-1998 Through 18-09-1998",
year = "1998",
month = jan,
day = "1",
doi = "10.1007/BFb0055867",
language = "English",
isbn = "3540650040",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "241--255",
editor = "Yves Deswarte and Jean-Jacques Quisquater and Dieter Gollmann and Catherine Meadows",
booktitle = "Computer Security — ESORICS 1998 - 5th European Symposium on Research in Computer Security, Proceedings",
}