Abstract
Since the idea of digital watermarks was proposed, various watermarking schemes have been developed to protect digital contents in electronic transactions. However, most schemes limit themselves to the simplified buyerseller model that can be applied to only a small number of cases rather than common scenarios in real life. In this paper, a more practical watermarking scheme is proposed to protect digital contents in real-world transactions using PKI (Public-Key Infrastructure). The proposed scheme is considered more practical in the sense that one or more reselling agents may exist between buyers and the original seller, and the seller can package the merchandise in advance without the involvement of buyers. The packaged merchandize can hence be made publicly accessible (e.g., on top of an open shelf) for the purpose of demonstration and circulates in the market. The proposed scheme also preserves the anonymity of the buyers while guaranteeing that the distributor of any illegal copy will be unambiguously identified.
Chapter PDF
References
J. Doming-Ferrer and J. Herrera-Joancomarti, “Efficient Smart-Card Based Anonymous Fingerprinting,” Proceedings of International Conference on Smart Card Research and Applications (CARDIS ’98), LNCS 1820, pp. 221–228, September 1998.
N. Memon and P. W. Wong, “A Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing, Vol. 10, No. 4, pp. 643–649. April 2001.
B. Pfitzmann and A.-R. Sadeghi, “Coin-Based Anonymous Fingerprinting,” Proceedings of 17th Annual IACR Eurocrypt Conference (EUROCRYPT ’99), LNCS 1592, pp. 150–164, May 1999.
L. Qiao and K. Nahrstedt, “Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights,” Journal of Visual Communication and Image Representation, Vol. 9, No. 3, pp. 194–210, September 1998.
C.-L. Lei and M.-H. Chan, “An Efficient Anonymous Buyer-Seller Watermarking Protocol,” 2002 International Computer Symposium, Workshop on Cryptology and Information Security, December 2002.
G. Depovere, T. Kalker, and J.-P. Linnartz, “Improved Watermark Detection Reliability Using Filtering Before Correlation,” Proceedings of IEEE International Conference on Image Processing (ICIP ’98), Vol. 1, pp. 430–434, October 1998.
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Mulimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673–1687, December 1997.
J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto, “Performance Analysis of a 2-D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 510–524, May 1998.
A. Herrigel, J. O. Ruanaidh, H. Petersen, S. Pereira, and T. Pun, “Secure Copyright Protection Techniques for Digital Images,” Proceedings of Second International Workshop on Information Hiding (IH ’98), LNCS 1525, pp. 169–190, April 1998.
N. Memon and P. W. Wong, “Protecting Digital Media Content,” Communications of the ACM, Vol. 41, No. 7, pp. 35–43, July 1998.
ISO Store, http://www.iso.org/iso/en/prods-services/ISOstore/store.html.
IETF Public-Key Infrastructure (X.509) Working Group. http://www.ietf.org/ html.charters/pkix-charter.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yu, PL., Tsai, PL., Lei, CL. (2004). A Content-Protection Scheme for Multi-Layered Reselling Structures. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_22
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_22
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive