Dual Watermarking Scheme For Secure Buyer-Seller Watermarking Protocol

被引:0
|
作者
Mehra, Neelesh [1 ]
Shandilya, Madhu [2 ]
机构
[1] SATI Vidisha, Dept Elect & Comm, Vidisha, Madhya Pradesh, India
[2] MANIT, Dept Elect & Commun, Bhopal, India
关键词
Buyer-Seller watermarking protocols; watermarking; copy protection; copyright protection; EFFICIENT;
D O I
10.1117/12.956459
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Mobile 3D game contents watermarking based on buyer-seller watermarking protocol
    Kwon, Seong-Geun
    Lee, Suk-Hwan
    Kwon, Ki-Ryong
    Lee, Eung-Joo
    Ok, Soo-Yol
    Bae, Sung-Ho
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (07): : 2018 - 2026
  • [32] An Efficient Buyer-Seller Watermarking Protocol Based on Composite Signal Representation
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2009, : 9 - 18
  • [33] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Jyun-Ci Huang
    Fuh-Gwo Jeng
    Tzung-Her Chen
    [J]. Multimedia Tools and Applications, 2017, 76 : 9667 - 9679
  • [34] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Huang, Jyun-Ci
    Jeng, Fuh-Gwo
    Chen, Tzung-Her
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9667 - 9679
  • [35] An enhanced buyer seller watermarking protocol
    Chang, CC
    Chung, CY
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1779 - 1783
  • [36] Cloud-based Buyer-Seller Watermarking Protocols
    Peng, Yi-Jia
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [37] A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications
    Choi, J
    Park, J
    [J]. DIGITAL WATERMARKING, 2005, 3304 : 232 - 243
  • [38] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [39] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [40] Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Culnane, Chris
    [J]. MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 205 - 213