Abstract
With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an individual with no risk and little cost in any situation in public or private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual’s private life to the public. Social and legal measures are increasingly taken to deal with this problem, but they are hard to enforce in practice. In this paper, we proposed a model for privacy infrastructures aiming for the distribution channel such that as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action in the first place. The implementation issues of the proposed protocol are discussed. Digital rights management techniques are applied in our proposed infrastructure, and data identification techniques such as digital watermarking and robust perceptual hashing are proposed to enhance the distributed content identification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Open Digital Rights Language (ODRL), http://www.odrl.net
XrML is being contributed to the standards body OASIS Rights Language Technical Committee as its foundation technology, http://www.xrml.org
Directive 95/46/ec of the european parliament and the council of 24 october 1995. Official Journal L 281, 23/11/1995, 0031–0050 (1995)
Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Digital Rights Management Workshop, pp. 111–119 (2003)
Agi, L., Cong, L.: An empirical study of secure mpeg video transmissions. In: Proc. of the Internet society symposium on network and distributed system security, San Diego, CA (February 1996)
Open Mobile Alliance. OMA digital rights management version 1.0. OMA, http://www.openmobilealliance.org/documents.html
Blau, J.: Cracks appear in Bluetooth security. NetworkWorld.com (February 2004), http://www.networkworld.com/news/2004/0211cracksappear.html
Cardin, P.: Robust signal representation for image identification and hashing. Student Literature survey (2005)
CNN. Teacher’s Bush remarks investigated - Some students protest teacher being put on leave (March 2006), http://www.cnn.com/2006/EDUCATION/03/03/teacher.bush.ap/?section=cnn_topstories
Deitz, L.: Privacy and security – ecs privacy directive: protecting personal data and ensuring its free movement. Computers and Security Journal, 25–46
Dix, A.: Das Recht am eigenen Bild – Anachronismus im Zeitalter des Internet? In: Mediale (Selbst-)Darstellung und Datenschutz, Konferenz des LfD NRW (2000)
Anderson, R.J., Petitcolas, F.A.P., Kuhn, M.G.: Information hiding-a survey. 87, 1062–1078 (1999)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarkin (March 2000)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, special issue on protecting of multimedia contents, vol. 87, pp. 1079–1107 (July 1999)
Hartung, F., Ramme, F.: Digital rights management and watermarking for multimedia content for m-commerce. IEEE communications magazine 38, 78–84 (2000)
Johnson, M., Ramchandran, K.: Dither-based secure image hashing using distributed coding. In: ICIP (2), pp. 751–754 (2003)
Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking. Artech House, INC. (2000)
Korba, L., Kenny, S.: Towards meeting the privacy challenge: Adapting drm. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 118–136. Springer, Heidelberg (2003)
Kozat, S., Mihçak, M.K., Venkatesan, R.: Robust perceptual hashing via matrix invariance. In: Proc. Of IEEE international conference on image processing ICIP, Singapore, September 2004, Springer, Heidelberg (2004)
Ku, W., Chi, C.: Survey on the technological aspects of digital rights management. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 391–403. Springer, Heidelberg (2004)
Macq, B.M., Dittmann, J., Delp, E.J.: Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE 92(6), 971–984 (2004)
MarcSpider. Digimarc image tracking service. DigiMarc corporation, (2001), http://www.digimarc.com/products/imagebridge/MarcSpider/default.asp
McCarthy, E.P., Balado, F., Silverstre, G.C.M., Hurley, N.J.: A framework for soft hashing and its application to robust image hashing. In: IS&T/SPIE (ed.) Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 2005, vol. 5681, pp. 5681–06 (2005)
Mihçak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, London, UK, pp. 13–21. Springer, Heidelberg (2002)
Mikolajczyk, K., Schmid, C.: A performance evaluation of local descriptors. In: PAMI (Submitted, 2004)
Monga, V., Evans, B.L.: Robust perceptual image hashing using feature points. In: Proc. IEEE Int. Conf. on Image Processing, Singapore (October 2004)
Monga, V., Vats, D., Evans, B.L.: Image authentication under geometric attacks via structure matching. In: Proc. IEEE Int. Conf. on Multimedia & Expo, London, UK, July 2005, Amsterdam, The Netherlands (2005)
Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: IHW 2001: Proceedings of the 4th International Workshop on Information Hiding, pp. 340–353. Springer, Heidelberg (2001)
Petitcolas, F.A., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: SPIE International Symposium on Electronic Imaging 2001. Proceedings of the SPIE, vol. 4314, pp. 575–584. SPIE (2001); Security and Watermarking of Multimedia Contents III
Podilchuk, C.I., Wolfgang, R.B., Delp, E.J.: Perceptual watermarks for digital images and video. In: special issues on identification and protection of multimedia information, pp. 40–51. IEEE, Los Alamitos (1998)
Raymond, E.: HP Developing Picture Jamming Technology to Block Unwanted Photographs, http://www.digitalcamerainfo.com/d/News.htm
Rosenblatt, B.: Steganography revisited: watermarking comes in from the cold. 3(5) (June 2003)
Sensaura. UK companies team to solve worldwide camera phone privacy abuse. British Safe Haven technology enables digital cameras to be disabled in a localized environment. Sensaura press release (September 2003), http://www.sensaura.com/news/pr.php?article=2003_09_11.inc
Skrepth, C.J., Uhl, A.: Robust hash functions for visual data: An experimental comparison. In: Iberian Conference on Pattern Recognition and Image Analysis, pp. 986–993 (2003)
Solachidis, V., Tefas, A., Nikolaidis, N., Tsekeridou, S., Nikolaidis, A., Pitas, I.: A benchmarking protocol for watermarking methods. In: Int. Conf. on Image Processing (ICIP 2001), vol. 21, pp. 7–10. IEEE, Los Alamitos (2001)
Trimeche, M., Chebil, F.: Digital rights management for visual content in mobile applications. In: First International Symposium on Control, Communications and Signal Processing, IEEE, Los Alamitos (2004)
Wu, M., Trappe, W., Wang, Z., Liu, K.J.R.: Collision resistant fingerprinting for multimedia. In: Signal Processing magazine, vol. 21, pp. 15–27. IEEE, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deng, M., Fritsch, L., Kursawe, K. (2006). Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_10
Download citation
DOI: https://doi.org/10.1007/11957454_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68790-0
Online ISBN: 978-3-540-68793-1
eBook Packages: Computer ScienceComputer Science (R0)