Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents

被引:3
|
作者
Phan, Raphael C. -W. [2 ]
Goi, Bok-Min [3 ]
Poh, Geong-Sen [4 ]
Kim, Jongsung [1 ]
机构
[1] Kyungnam Univ, Div E Business, Masan, South Korea
[2] Univ Loughborough, Loughborough, Leics, England
[3] UTAR, Fac Sci & Engn, Setapak, Malaysia
[4] Univ London, Informat Secur Grp, Egham, Surrey, England
关键词
Security systems; Trustworthy applications; Content protection; Transactions; Digital rights protection; Watermarking and fingerprinting protocol; Buyer-seller; Anonymity; Unbinding property; Secret sharing; FINGERPRINTING PROTOCOL; CRYPTANALYSIS; ANONYMITY; SCHEMES; DESIGN;
D O I
10.1007/s11277-009-9876-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of security is a major concern. Security in this setting encompasses both in the interest of the human users as well as their information and objects that they own. A typical kind of transaction interaction among users and/or machines in these environments is that of exchanging digital objects via purchases and/or ownership transfers, e.g. someone buying a song from iTunes via his iPhone, or downloading either bought or rented movies onto a portable DVD player. Here, there is a need to provide trustworthy protection of the rights of both parties; i.e. the seller's copyright needs to be protected against piracy, while on the other hand it has been highlighted in literature the need to protect innocent buyers from being framed. Indeed, if either party cannot be assured that his rights are protected when he is involved in transactions within such environments, he would shy away and instead prefer for instance the more conventional non-digital means of buying and selling. And therefore without active participation from human users and object owners it is difficult to fully kick off the actual realization of intelligent environments. Zhang et al. recently proposed a buyer-seller watermarking protocol without a trusted third party based on secret sharing. While it is a nice idea to eliminate the need of a trusted third party by distributing secret shares between the buyer and the seller such that neither party has knowledge of the fingerprint embedded in a content, we show that it is possible for a buyer to remove his part of the fingerprint from the content he bought. This directly disproves the piracy tracing property claimed by the protocol. In fact, since piracy tracing is one of the earliest security applications of watermarking schemes, it raises doubts as to the soundness of the design of this protocol.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [1] Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
    Raphael C.-W. Phan
    Jongsung Bok-Min Goi
    [J]. Wireless Personal Communications, 2011, 56 : 73 - 83
  • [2] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [3] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [4] A buyer-seller watermarking protocol for digital secondary market
    Chunlin Song
    Jie Sang
    Sud Sudirman
    [J]. Multimedia Tools and Applications, 2018, 77 : 225 - 249
  • [5] A buyer-seller watermarking protocol for digital secondary market
    Song, Chunlin
    Sang, Jie
    Sudirman, Sud
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 225 - 249
  • [6] A Lightweight Buyer-Seller Watermarking Protocol
    Wu, Yongdong
    Pang, Hweehua
    [J]. ADVANCES IN MULTIMEDIA, 2008, 2008
  • [7] Research on secure buyer-seller watermarking protocol
    Liu Quan
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 370 - 376
  • [8] A Secure and Efficient Buyer-seller Watermarking Protocol
    Fu, Lingyun
    Hu, Defa
    Wang, Xiaoliang
    Chen, Jianli
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 898 - +
  • [9] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [10] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +