Documente Academic
Documente Profesional
Documente Cultură
Outline
Digital Watermarking Document Distribution Infrastructure Three Phases of Document Distribution Protocol
Introduction
Enterprise document management across a large enterprise is difficult.
Sensitive documents often found in photocopier rooms or public folders at file servers
Why?
It involves both digital and non-digital forms. It covers both automated and manual procedures. It requires a truly distributed solution. It supports multimedia format. It must be flexible, allowing individual group to refine its own policies.
HICSS36 - scc
Introduction
We propose the use of digital watermarking to enforce enterprise document distribution policy.
End User
Document provider disseminates Document Provider watermarked documents based on the registration certificate submitted by end user
A Watermarking Infrastructure for Enterprise Document Management
HICSS36 - scc
HICSS36 - scc
HICSS36 - scc
HICSS36 - scc
Issues
- Secrecy of watermarks
- End users cannot be trusted - Document providers cannot be trusted - End users cannot be trusted - Document providers cannot be trusted
HICSS36 - scc
Problem
Identify the origin of illegal distribution End user owning the origin is liable End users watermark is analogous to a private key Could we protect end users watermark in document distribution to prevent others (including the document provider) from abusing the watermark?
HICSS36 - scc A Watermarking Infrastructure for Enterprise Document Management 9
Solution Sketch
End users need not release their watermarks Instead, end users release an encrypted version of their watermarks So, how does a document provider validate an encrypted watermark? Trusted Enterprise Registration Authority Use registration certificate to protect the integrity of encrypted watermark
HICSS36 - scc A Watermarking Infrastructure for Enterprise Document Management 10
HICSS36 - scc
Obtain Once
End User
A Watermarking Infrastructure for Enterprise Document Management
Document Provider
11
Sign(RCertB)
generated by *
binary association
1 refers to
refers to 1
End User
1
Watermark (W)
HICSS36 - scc
12
Watermark Acquisition
Enterprise Registration Authority End User
generate watermark
store certificate
HICSS36 - scc A Watermarking Infrastructure for Enterprise Document Management 13
End User
Registration Certificate RCertB
Document Provider
verify
submit request
generate request identifier (V) activities update license database with V synchronization bar encrypt contents permutate watermark
HICSS36 - scc
data objects
Encrypted Watermarked Contents A Watermarking Infrastructure for insert encrypted watermark EKB(X W)
14
Policy Enforcer
Document Provider
submit X activities
retrieve permutation function and registration certificate (RCertB) send evidence & RCertB
encrypt X by EKB
data objects
[yes]
Implementation Architecture
Certificate Repository
Maintain directories of valid and revoked Registration Certificates Request Registration Certificate Look up document access information and policy
Document Registry
Policy Enforcer
Deliver Registration Certificate
End User
16
Optional
Conclusion
We have proposed a distribution protocol and its infrastructure for watermarked documents
features with two roles: end users and document providers; does not require trusts on these parties in the protection and distribution of watermarks; assumes a trusted enterprise registration authority and the use of registration certificates
A Watermarking Infrastructure for Enterprise Document Management
HICSS36 - scc
18
Future Work
Study the effectiveness of our protocol with respect to various watermarking schemes Adapt the techniques to digital contents in JPEG2000 format Study the integration of watermarking protocols and inter-organizational workflows [1,2,3] and emarketplace negotiations [4]
1.
2. 3. 4.
S.C. Cheung, Dickson K.W. Chiu and Sven Till, A Data-Driven Methodology to Extending Workflows to Eservices over the Internet (HICSS-36), January 2003. Dickson K.W. Chiu, S.C. Cheung and Sven Till, A Three Layer Architecture for E-Contract Enforcement in an E-Service Environment (HICSS-36), January 2003. Dickson K.W. Chiu, Wesley C.W. Chan, Gary K.W. Lam, S.C. Cheung and Franklin T. Luk, An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry (HICSS-36), January 2003. S.C. Cheung, Patrick C.K. Hung and Dickson K.W. Chiu, On the e-Negotiation of Unmatched Logrolling Views (HICSS-36), January 2003.
HICSS36 - scc A Watermarking Infrastructure for Enterprise Document Management 19
Then we have,
HICSS36 - scc
22