Skip to main content

Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement

  • Conference paper
Privacy Enhancing Technologies (PET 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4258))

Included in the following conference series:

Abstract

With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an individual with no risk and little cost in any situation in public or private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual’s private life to the public. Social and legal measures are increasingly taken to deal with this problem, but they are hard to enforce in practice. In this paper, we proposed a model for privacy infrastructures aiming for the distribution channel such that as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action in the first place. The implementation issues of the proposed protocol are discussed. Digital rights management techniques are applied in our proposed infrastructure, and data identification techniques such as digital watermarking and robust perceptual hashing are proposed to enhance the distributed content identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Open Digital Rights Language (ODRL), http://www.odrl.net

  2. XrML is being contributed to the standards body OASIS Rights Language Technical Committee as its foundation technology, http://www.xrml.org

  3. Directive 95/46/ec of the european parliament and the council of 24 october 1995. Official Journal L 281, 23/11/1995, 0031–0050 (1995)

    Google Scholar 

  4. Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking schemes provably secure against copy and ambiguity attacks. In: Digital Rights Management Workshop, pp. 111–119 (2003)

    Google Scholar 

  5. Agi, L., Cong, L.: An empirical study of secure mpeg video transmissions. In: Proc. of the Internet society symposium on network and distributed system security, San Diego, CA (February 1996)

    Google Scholar 

  6. Open Mobile Alliance. OMA digital rights management version 1.0. OMA, http://www.openmobilealliance.org/documents.html

  7. Blau, J.: Cracks appear in Bluetooth security. NetworkWorld.com (February 2004), http://www.networkworld.com/news/2004/0211cracksappear.html

  8. Cardin, P.: Robust signal representation for image identification and hashing. Student Literature survey (2005)

    Google Scholar 

  9. CNN. Teacher’s Bush remarks investigated - Some students protest teacher being put on leave (March 2006), http://www.cnn.com/2006/EDUCATION/03/03/teacher.bush.ap/?section=cnn_topstories

  10. Deitz, L.: Privacy and security – ecs privacy directive: protecting personal data and ensuring its free movement. Computers and Security Journal, 25–46

    Google Scholar 

  11. Dix, A.: Das Recht am eigenen Bild – Anachronismus im Zeitalter des Internet? In: Mediale (Selbst-)Darstellung und Datenschutz, Konferenz des LfD NRW (2000)

    Google Scholar 

  12. Anderson, R.J., Petitcolas, F.A.P., Kuhn, M.G.: Information hiding-a survey. 87, 1062–1078 (1999)

    Google Scholar 

  13. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarkin (March 2000)

    Google Scholar 

  14. Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, special issue on protecting of multimedia contents, vol. 87, pp. 1079–1107 (July 1999)

    Google Scholar 

  15. Hartung, F., Ramme, F.: Digital rights management and watermarking for multimedia content for m-commerce. IEEE communications magazine 38, 78–84 (2000)

    Article  Google Scholar 

  16. Johnson, M., Ramchandran, K.: Dither-based secure image hashing using distributed coding. In: ICIP (2), pp. 751–754 (2003)

    Google Scholar 

  17. Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking. Artech House, INC. (2000)

    Google Scholar 

  18. Korba, L., Kenny, S.: Towards meeting the privacy challenge: Adapting drm. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 118–136. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Kozat, S., Mihçak, M.K., Venkatesan, R.: Robust perceptual hashing via matrix invariance. In: Proc. Of IEEE international conference on image processing ICIP, Singapore, September 2004, Springer, Heidelberg (2004)

    Google Scholar 

  20. Ku, W., Chi, C.: Survey on the technological aspects of digital rights management. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 391–403. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Macq, B.M., Dittmann, J., Delp, E.J.: Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE 92(6), 971–984 (2004)

    Article  Google Scholar 

  22. MarcSpider. Digimarc image tracking service. DigiMarc corporation, (2001), http://www.digimarc.com/products/imagebridge/MarcSpider/default.asp

  23. McCarthy, E.P., Balado, F., Silverstre, G.C.M., Hurley, N.J.: A framework for soft hashing and its application to robust image hashing. In: IS&T/SPIE (ed.) Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, January 2005, vol. 5681, pp. 5681–06 (2005)

    Google Scholar 

  24. Mihçak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, London, UK, pp. 13–21. Springer, Heidelberg (2002)

    Google Scholar 

  25. Mikolajczyk, K., Schmid, C.: A performance evaluation of local descriptors. In: PAMI (Submitted, 2004)

    Google Scholar 

  26. Monga, V., Evans, B.L.: Robust perceptual image hashing using feature points. In: Proc. IEEE Int. Conf. on Image Processing, Singapore (October 2004)

    Google Scholar 

  27. Monga, V., Vats, D., Evans, B.L.: Image authentication under geometric attacks via structure matching. In: Proc. IEEE Int. Conf. on Multimedia & Expo, London, UK, July 2005, Amsterdam, The Netherlands (2005)

    Google Scholar 

  28. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: IHW 2001: Proceedings of the 4th International Workshop on Information Hiding, pp. 340–353. Springer, Heidelberg (2001)

    Google Scholar 

  29. Petitcolas, F.A., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: SPIE International Symposium on Electronic Imaging 2001. Proceedings of the SPIE, vol. 4314, pp. 575–584. SPIE (2001); Security and Watermarking of Multimedia Contents III

    Google Scholar 

  30. Podilchuk, C.I., Wolfgang, R.B., Delp, E.J.: Perceptual watermarks for digital images and video. In: special issues on identification and protection of multimedia information, pp. 40–51. IEEE, Los Alamitos (1998)

    Google Scholar 

  31. Raymond, E.: HP Developing Picture Jamming Technology to Block Unwanted Photographs, http://www.digitalcamerainfo.com/d/News.htm

  32. Rosenblatt, B.: Steganography revisited: watermarking comes in from the cold. 3(5) (June 2003)

    Google Scholar 

  33. Sensaura. UK companies team to solve worldwide camera phone privacy abuse. British Safe Haven technology enables digital cameras to be disabled in a localized environment. Sensaura press release (September 2003), http://www.sensaura.com/news/pr.php?article=2003_09_11.inc

  34. Skrepth, C.J., Uhl, A.: Robust hash functions for visual data: An experimental comparison. In: Iberian Conference on Pattern Recognition and Image Analysis, pp. 986–993 (2003)

    Google Scholar 

  35. Solachidis, V., Tefas, A., Nikolaidis, N., Tsekeridou, S., Nikolaidis, A., Pitas, I.: A benchmarking protocol for watermarking methods. In: Int. Conf. on Image Processing (ICIP 2001), vol. 21, pp. 7–10. IEEE, Los Alamitos (2001)

    Google Scholar 

  36. Trimeche, M., Chebil, F.: Digital rights management for visual content in mobile applications. In: First International Symposium on Control, Communications and Signal Processing, IEEE, Los Alamitos (2004)

    Google Scholar 

  37. Wu, M., Trappe, W., Wang, Z., Liu, K.J.R.: Collision resistant fingerprinting for multimedia. In: Signal Processing magazine, vol. 21, pp. 15–27. IEEE, Los Alamitos (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deng, M., Fritsch, L., Kursawe, K. (2006). Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_10

Download citation

  • DOI: https://doi.org/10.1007/11957454_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68790-0

  • Online ISBN: 978-3-540-68793-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics