Copyright? Protection?

  • Cynthia Dwork
Part of the The IMA Volumes in Mathematics and its Applications book series (IMA, volume 107)


In an effort to prevent or discourage the unauthorized redistribution of legally purchased copyrighted material, several techniques have been proposed for identifying and tracing content. Such approaches are typically flawed in two ways. This paper briefly describes specific techniques proposed in the literature or available as products, describes the two principal flaws, and mentions some alternatives intended to circumvent these flaws.


Digital Library Hybrid Original Copyright Protection Marked Image Random String 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    The Arcade Project: A Progress Report, Ciphertext: The RSA Newsletter, Vol. 2, No. 1, 1994, p. 6.Google Scholar
  2. [2]
    U.S. Patent 500,403, issued March 21, 1995, assigned to RSA Data Security, Inc., Redwood City, CA.Google Scholar
  3. [3]
    D. Boneh and Shaw, Collusion Secure Fingerprinting for Digital Data, Proc. Advances in Cryptology - Crypto ‘85, LNCS 96, Springer, pp. 452–465, 1995, full paper available: Google Scholar
  4. [4]
    J. Brassil, S. Low, N.F. Maxemchuck, and L. O’gorman, Electronic Marking and Identification Techniques to Discourage Document Copying, 13th Annual Joint Conference of the IEEE computer and Communication Societies, Proc. 1III InfoComm 94, pp. 1278–1287, 1994.Google Scholar
  5. [5]
    CEM CELEBILER, personal communication. Google Scholar
  6. [6]
    Chor B., A. Fiat and M. Naor, Tracing traitors, Advances in Cryptology - CRYPTO’ 94, LNCS 839, Springer, pp. 257–270, 1994, full version available.Google Scholar
  7. [7]
    B. Chor and S. Goldwasser and S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, FOCS 85, pp. 383–395, 1985.Google Scholar
  8. [8]
    D. Choy, C. Dwork, J. Lotspiech, L. Anderson, J. Boyer, R. Dievendorf, T. Griffin, B. Hoenig, M. Jackson, W. Kaka, J. Mccrossin, A. Miller, R. Morris, N. Pass, A Digital Library System for Periodicals Distribution, Proc. Advances in Digital Libraries ‘86, 1996.Google Scholar
  9. [9]
    I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Frequency Domain Watermarking for Multimedia, manuscript, 1995.Google Scholar
  10. [10]
    W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE. Transactions on Information Theory, Nov. 1976, pp. 644–654.Google Scholar
  11. [11]
    World Intellectual Property Organization publication PCT/US94/13366, May 1995.Google Scholar
  12. [12]
    Digimarc home page:
  13. [13]
    C. Dwork, J. Lotspiech, and M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, STOC 28, pp. 489–498, 1996.MathSciNetGoogle Scholar
  14. [14]
    P. Feldman, A practical scheme for non-interactive verifiable secret sharing, FOCS 28, pp. 427–437, 1987.Google Scholar
  15. [15]
    T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, Proc. Advances in Cryptology - Crypto ‘81, Lecture Notes in Computer Science No. 576, Springer, pp. 129–140, 1992.Google Scholar

Copyright information

© Springer Science+Business Media New York 1999

Authors and Affiliations

  • Cynthia Dwork
    • 1
  1. 1.IBM Almaden Research CenterUSA

Personalised recommendations