Hindawi Publishing Corporation Advances in Multimedia Volume 2012, Article ID 875759, 17 pages doi:10.1155/2012/875759 Research Article Robust Signature-Based Copyright Protection Scheme Using the Most Significant Gray-Scale Bits of the Image Mohammad Awrangjeb Cooperative Research Centre for Spatial Information, Department of Infrastructure Engineering, University of Melbourne, VIC 3010, Australia Correspondence should be addressed to Mohammad Awrangjeb, mawr@unimelb.edu.au Received 15 November 2011; Revised 2 March 2012; Accepted 27 March 2012 Academic Editor: Xian-Sheng Hua Copyright © 2012 Mohammad Awrangjeb. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The most significant bit - (MSB-) plane of an image is least likely to change by the most signal processing operations. This paper presents a novel multibit logo-based signature, using the most significant gray-scale bits, which is then used to develop an extremely simple but robust copyright protection scheme, where images along with their signatures are sent to a trusted third party when a dispute arises. Dierent ways of processing the MSB-plane before calculating the robust signature have been developed. This paper then presents an innovative classifier-based technique to test the robustness and uniqueness of any signature-based scheme. A new MSB-based attack, which would defeat our scheme most, has also been proposed. Experimental results have clearly demonstrated the superiority of the proposed scheme showing the high robustness of dierent MSB-based signatures over the existing signature- based schemes. 1. Introduction For last few years, we have been using electronic commerce that includes online and oine distribution of multimedia data like images, audios, and videos. However, digital multimedia files can be easily manipulated using commercial graphics tools. Duplicating digital files has become as simple as clicking a button. Since maintaining an exact or manipulated duplicate of any digital data is easier than before, the enforcement of copyright protection has become more imperative than ever. Although copyright laws are being applied against abusers in order to ensure secure electronic commerce, the current problems with copyright protection obstruct the rapid evolution of computer and communication networks. As a result, the enhancement and further development of digital copyright protection is in cen- tral to the development of future communication networks [1]. There may be three types of solutions to the copyright protection problem: cryptographic tools, digital watermark- ing techniques, and digital signature-based techniques. Cryptographic tools [2] can be used to encrypt a multimedia file using some secret key. The encrypted file is no more perceptually understandable and can be distributed to the users. Only the appropriate user that holds the secret key can decrypt and use this file. Such a technique while suitable for text documents is not suitable for multimedia data for the following two reasons. First, multimedia file size is much larger than that of text. Therefore, encrypting or decrypting a multimedia file is highly time consuming. Second, the encrypted media file is not useful in the public domain, for example, in the Internet. Because the encrypted file is not perceptually understandable and if the encrypted information is decrypted once, the information is no longer protected. However, the multimedia file provides an opportunity that the text document does not. That is, while no distortion is allowed in the signed text, some distortions are allowed in the signed multimedia file as long as it is perceptually similar to the original file. Digital watermarking techniques take the opportunity of the abovementioned property of the media file. They embed a watermark such as logos, seals, or sequence numbers, into the original image. The embedded watermark should survive against both malicious and nonmalicious attacks depending on the applications. Latter, the embedded information is