A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection (original) (raw)
Related papers
2017
Digital watermarking protocols are the one, which have combined fingerprinting technique with watermarking, for embedding digital signal or watermark into an original multimedia object. Buyer-seller watermarking protocol is fundamentally applied to continue the digital rights of both buyers and seller. We proposed an identity-based buyer-seller watermarking protocol that encounters various weaknesses of Zhang et al.'s watermarking protocol. We ensured that by pointing out these weaknesses, inaccuracy can be minimised for further implementing the buyer-seller watermarking protocol. The suggested protocol uses ID-based public key cryptography and digital watermarking scheme to place the ownership of digital content. Hence, copyright protection is attained. We claim that our suggested protocol is efficient and has adequate security as compared to traditionally proposed protocols, and therefore suitable for any practical buyer-seller watermarking scheme.
A Secure and Efficient Buyer-Seller Watermarking Protocol
Journal of Multimedia, 2009
The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer
A simple and secure watermarking protocol
Proceedings of the 2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012, 2012
The advances in multimedia and networking technologies enable copyright infringement of digital content distributed on Internet. Such infringement, particularly promoted by peer-to-peer file-sharing, causes copyright holders lost sales every year. Consequently, methods to protect digital copyright protection are needed in a global Internet environment. Watermarking protocols are recognized as a promising technique developed to address the problem of asserting authorship and determining accountability when piracy occurs. In this paper, a simple watermarking protocol purposely designed to be easily implemented in the current model of content distribution on the Internet is proposed. The protocol is secure and able to protect the digital asset of the web-based distribution and associated rights.
On the (In)Security of Two Buyer-Seller Watermarking Protocols
Security and Cryptography, 2008
A buyer-seller watermarking protocol deters dishonest buyers from illegally distributing bought content. This is achieved by giving the seller the capability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protocols have been proposed, with two recent proposals being the protocols proposed by Ibrahim et al. in IAS 2007 and SECRYPT 2007. We will show that these protocols are not secure, especially for the seller. We further put forward our thoughts on how it is possible to avoid the security weaknesses found in them.
A Verifiable and Secret Buyer–Seller Watermarking Protocol
IETE Technical Review, 2014
A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer-seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer's secret key into two primary mechanisms: the buyer's watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer's watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer's rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer's watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.
Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques
Theoretical Computer Science, 1999
In this paper 1 we present a new approach for the secure and robust copyright protection of digital images. We describe a system for generating digital watermarks and for trading watermarked images. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to emb e d a w atermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation su ered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for di erent purposes, namely embedding detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the veri cation function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the con dential keying information.
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
IEEE Transactions on Information Forensics and Security, 2000
Buyer-seller watermarking (BSW) protocols allow copyright protection of digital content. The protocol is anonymous when the identity of buyers is not revealed if they do not release pirated copies. Existing BSW protocols are not provided with a formal analysis of their security properties. We employ the ideal-world/real-world paradigm to propose a formal security definition for copyright protection protocols, and we analyze an anonymous BSW protocol and prove that it fulfills our definition. Additionally, we implement the protocol and measure its efficiency.
An Efficient and Anonymous Buyer-Seller Watermarking Protocol
IEEE Transactions on Image Processing, 2004
Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed schemes, and propose an secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed scheme is able to simultaneously resolve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed scheme, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.
High Capacity Secured Digital Watermarking for Copyright Protection
International Journal of Engineering and Advanced Technology
Computer Network provides a way to share and distribute files and information to the masses within a short span of time. With the advancement in the networking technology, many new ways to share the information is cropping up like mushrooms. With the growth in technology and ways to share information, security and authentication of the information becomes a major issue. There are many ways to secure the information shared, like Cryptography, which makes the information shared unintelligible and Steganography, which hides the data to be shared inside another digital medium like text, image, video or audio files. We propose a high capacity secured digital watermarking steganography by combining cryptography and steganography thus taking advantage of the merits of both Cryptography and Steganography. We achieve high capacity by compression and security by encryption