{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:08:29Z","timestamp":1754158109247,"version":"3.41.2"},"reference-count":15,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2007,2,27]],"date-time":"2007-02-27T00:00:00Z","timestamp":1172534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,2,27]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography\u2010based digital rights management (DRM) systems by allowing the protection of content beyond the domain protected by the DRM system.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Digital watermarking is a passive technology, not allowing the active prevention of copyright violations. But it allows the irreversible linking of information with multimedia data, ensuring that an embedded watermark can be retrieved even after analogue copies. Therefore watermarking can be used where DRM fails: whenever content needs to be moved out of the protected DRM domain, e.g. when playing back content via analogue output channels it can mark the content with information that would help to identify its origin if it is used for copyright violations. The remaining challenge now is to find the marked content within the channels regularly used for copyright violations. The paper therefore introduces a concept for scanning file sharing networks for marked content.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The vast number of files present in the file sharing networks prohibits every approach based on completely scanning and analysing each file. Therefore concepts for filtered search queries where only potentially watermarked files are downloaded are discussed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper shows how watermarking can be applied as a technology to allow active content protection beyond the limitations of current DRM systems.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710731001","type":"journal-article","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T10:52:26Z","timestamp":1172659946000},"page":"10-21","source":"Crossref","is-referenced-by-count":15,"title":["Complementing DRM with digital watermarking: mark, search, retrieve"],"prefix":"10.1108","volume":"31","author":[{"given":"Patrick","family":"Wolf","sequence":"first","affiliation":[]},{"given":"Martin","family":"Steinebach","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Diener","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021820183717000_b1","unstructured":"Allamanche, H., Helmuth, F. and Kasten, C. (2001), \u201cContent\u2010based identification of audio material using MPEG\u20107 low level description\u201d, Electronic Proceedings of the International Symposium of Music Information Retrieval, available at: http:\/\/ismir2001.ismir.net\/papers.html."},{"key":"key2022021820183717000_b2","doi-asserted-by":"crossref","unstructured":"Burges, J., Platt, J. and Jana, S. (2002), \u201cExtracting noise\u2010robust features from audio data\u201d, paper presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP 2002), Orlando, FL, 13\u201017 May.","DOI":"10.1109\/ICASSP.2002.1005916"},{"key":"key2022021820183717000_b3","unstructured":"Cano, P., Batlle, E., Kalker, T. and Haitsma, J. (2002a), \u201cA review of algorithms for audio fingerprinting\u201d, paper presented at the International Workshop on Multimedia Signal Processing, US Virgin Islands, December."},{"key":"key2022021820183717000_b4","unstructured":"Cano, P., Gomez, E., Batlle, E., de Gomes, L. and Bonnet, M. (2002b), \u201cAudio fingerprinting: concepts and applications\u201d, paper presented at the International Conference on Fuzzy Systems Knowledge Discovery (FSKD'02), Singapore, November."},{"key":"key2022021820183717000_b6","unstructured":"CNET News (2004), \u201cFile sharing legal in Canada\u201d, CNET News, available at: http:\/\/news.com.com\/2100\u20101027_3\u20105182641.html."},{"key":"key2022021820183717000_b5","unstructured":"De Roover, C., De Vleeschouwer, C., Lefebvre, F. and Macq, B. (2005), \u201cKey\u2010frame radial projection for robust video hashing\u201d, paper presented at the Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux."},{"key":"key2022021820183717000_b7","unstructured":"Gamma, E., Helm, R., Johnson, R. and Vlissides, J. (1996), Design Patterns: Elements of Reusable Object\u2010Oriented Software, Addison\u2010Wesley Longman, Boston, MA."},{"key":"key2022021820183717000_b11","unstructured":"(The) Guardian (2004), \u201cOscars piracy man fined \u00a3165,000\u201d, The Guardian Digital Edition, available at http:\/\/film.guardian.co.uk\/piracy\/story\/0,1397436,00.html."},{"key":"key2022021820183717000_b8","unstructured":"Lu, C\u2010S. (2004), Multimedia Security, Idea Group Publishing, Hershey, PA."},{"key":"key2022021820183717000_b9","unstructured":"Mihcak, K. (2005), Robust Image Hashing, Microsoft Research, Polytechnic University, Brooklyn, NY, available at: http:\/\/cis.poly.edu\/seminars\/abstract6fall05.shtml."},{"key":"key2022021820183717000_b10","doi-asserted-by":"crossref","unstructured":"Mihcak, V. (2001), \u201cA perceptual audio hashing algorithm: a tool for robust audio identification and information hiding\u201d, Proceedings of the 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.","DOI":"10.1007\/3-540-45496-9_5"},{"key":"key2022021820183717000_b12","doi-asserted-by":"crossref","unstructured":"Oostveen, J., Kalker, T. and Haitsma, J. (2001), \u201cVisual hashing of digital video: applications and techniques\u201d, Proceedings of the SPIE 24th Conference Applications of Digital Image Processing, San Diego, CA.","DOI":"10.1117\/12.449746"},{"key":"key2022021820183717000_b13","doi-asserted-by":"crossref","unstructured":"\u00d6zer, H., Sankur, B. and Memon, N. (2005), \u201cRobust audio hashing for audio identification\u201d, European Signal Processing Conference (EUSIPCO).","DOI":"10.1155\/ASP.2005.1780"},{"key":"key2022021820183717000_b14","unstructured":"Schneier, B. (2001), \u201cThe futility of digital copy prevention\u201d, CRYPTO\u2010GRAM, 15 May."},{"key":"key2022021820183717000_b15","doi-asserted-by":"crossref","unstructured":"Skrepth, C. and Uhl, A. (2003), \u201cRobust hash functions for visual data: an experimental comparison\u201d, Proceedings of IbPRIA 2003.","DOI":"10.1007\/978-3-540-44871-6_114"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710731001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710731001\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710731001\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:43Z","timestamp":1753404043000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/1\/10-21\/314720"}},"subtitle":[],"editor":[{"given":"Mariemma","family":"Yag\u00fce","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,2,27]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2,27]]}},"alternative-id":["10.1108\/14684520710731001"],"URL":"https:\/\/doi.org\/10.1108\/14684520710731001","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2007,2,27]]}}}