[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Buyer-seller watermarking protocols with off-line trusted third parties

Published: 01 December 2009 Publication History

Abstract

In a buyer-seller watermarking protocol, buyers and sellers protect the ownerships or copyrights of their digital contents through the watermarks embedded in them. However, some known attacks and problems are still threatening the security of the watermarking mechanisms so far. Although several solutions have been introduced in the literature, none can cope with all problems. In this paper, we propose a novel buyer-seller watermarking protocol, with an off-line trusted third party, that can withstand the attacks and resolve the dispute between the buyers and the sellers fairly. Furthermore, our proposed protocol can guarantee the anonymity of the buyers as well.

References

[1]
Adelsbach, A. and Sadeghi, A. (2001) 'Zero knowledge watermark detection and proof of ownership', Proceedings of the 4th International Workshop on Information Hiding, LNCS 2137, Pittsburgh, PA, USA, pp.273-288.
[2]
Ahituv, N., Lpid, Y. and Neumann, S. (1987) 'Processing encrypted data', Communications of the ACM, Vol. 30, pp.777-780.
[3]
Capellà, M., Gomila, J. and Rotger, L. (2005) 'Anonymous payment in a fair e-commerce protocol with verifiable TTP', Trust, Privacy and Security in Digital Business, LNCS 3592, Springer-Verlag, Copenhagen, Denmark, pp.60-69.
[4]
Chaum, D. (1981) 'Untraceable electronic mail, return address, and digital pseudonyms', Communications of the ACM, Vol. 24, No. 2, pp.84-88.
[5]
Chaum, D., Fiat, A. and Naor, M. (1990) 'Untraceable electronic cash', Proceedings on Advances in Cryptology, LNCS 403, Sarita Uarbara, California, USA, pp.319-327.
[6]
Choi, J.G., Sakurai, K. and Park, J.H. (2003) 'Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party', Proceedings on Applied Cryptography and Network Security, LNCS 2846, Kunming, China, pp.265-279.
[7]
Cox, I.J., Kilian, J., Leighton, T. and Shamoon, T. (1997) 'Secure spread spectrum watermarking for multimedia', IEEE Transactions on Image Processing, Vol. 6, pp.1673-1687.
[8]
Ellison, C. (1999) SPKI Requirements, in RFC 2692.
[9]
Er, H.F. (1998) 'Literature survey on digital image watermarking', EE381K Multidimensional Signal Processing, pp.1-9.
[10]
Fan, C.I. and Chen, W.K. (2001) 'An efficient blind signature scheme for information hiding', International Journal of Electronic Commerce, Vol. 6, No. 1, pp.93-100.
[11]
Gwoboa, H. and Tzeng, H.C. (2007) 'A lightweight and anonymous copyright protocol', Computer Standards and Interfaces, Vol. 29, pp.229-237.
[12]
Lie, C.L., Yu, P.L., Tsai, P.L. and Chan, M.H. (2004) 'An efficient and anonymous buyer-seller watermarking protocol', IEEE Transactions on Image Processing, Vol. 13, No. 12, pp.1618-1626.
[13]
Memon, N. and Wong, P.W. (2001) 'A buyer-seller watermarking protocol', IEEE Transactions on Image Processing, Vol. 10, No. 4, pp.643-649.
[14]
Potdar, V.M., Han, S. and Chang, E. (2005) 'A survey of digital watermarking techniques', 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Perth, Western Australia, pp.709-716.
[15]
Ray, I. and Natarajan, N. (2005) 'An anonymous and failure resilient fair-exchange e-commerce protocol', Decision Support Systems, Vol. 39, No. 3, pp.267-292.
[16]
Rivest, R.L., Adleman, L. and Dertouzos, M.L. (1978a) 'On data banks and privacy homomorphisms', in DeMillo, R.A. et al. (Eds.): Foundations of Secure Computation, Academic Press, New York, pp.169-179.
[17]
Rivest, R.L., Shamir, A. and Adleman, L. (1978b) 'A method for obtaining digital signatures and public key cryptosystems', Communications of ACM, Vol. 21, pp.120-126.
[18]
Stinson, R. (1995) Cryptography: Theory and Practice, 1st ed., Chapman & Hall, New York.
[19]
Wang, C.H. (2003) 'Untraceable fair network payment protocols with off-line TTP', Advances in Cryptology - AISACRYPT 2003, Springer-Verlag, Taipei, Taiwan, pp.173-187.
[20]
Wang, S., Hong, F. and Cui, G. (2005) 'A fair e-cash payment scheme based on credit', Proceedings of the 7th International Conference on Electronic Commerce, ACM Press, Xi'an, China, pp.622-626.
[21]
Zhang, J., Kou, W. and Fan, K. (2006) 'Secure buyer-seller watermarking protocol', IEE Proceedings on Information Security, Vol. 153, pp.15-18.

Cited By

View all
  • (2009)Joint watermarking scheme for multiparty multilevel DRM architectureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2009.20332294:4(758-767)Online publication date: 1-Dec-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Ad Hoc and Ubiquitous Computing  Volume 4, Issue 1
December 2008
58 pages
ISSN:1743-8225
EISSN:1743-8233
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 December 2009

Author Tags

  1. attacks
  2. buyer anonymity
  3. buyer-seller watermarking
  4. copyright
  5. digital content
  6. digital right management
  7. ownership
  8. security
  9. trusted third parties
  10. watermarking protocols
  11. watermarks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2009)Joint watermarking scheme for multiparty multilevel DRM architectureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2009.20332294:4(758-767)Online publication date: 1-Dec-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media