A buyer-seller watermarking protocol

被引:203
|
作者
Memon, N
Wong, PW
机构
[1] Polytech Univ, Brooklyn, NY 11201 USA
[2] Apalo Com, Hong Kong, Hong Kong, Peoples R China
关键词
copy deterrence; digital watermarking; fingerprinting; watermarking protocols;
D O I
10.1109/83.913598
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content, In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol, This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.
引用
收藏
页码:643 / 649
页数:7
相关论文
共 50 条
  • [1] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [2] A Lightweight Buyer-Seller Watermarking Protocol
    Wu, Yongdong
    Pang, Hweehua
    [J]. ADVANCES IN MULTIMEDIA, 2008, 2008
  • [3] Research on secure buyer-seller watermarking protocol
    Liu Quan
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 370 - 376
  • [4] A Secure and Efficient Buyer-seller Watermarking Protocol
    Fu, Lingyun
    Hu, Defa
    Wang, Xiaoliang
    Chen, Jianli
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 898 - +
  • [5] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [6] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +
  • [7] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    [J]. IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [8] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    [J]. ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557
  • [9] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +
  • [10] An efficient and anonymous buyer-seller watermarking protocol
    Lei, CL
    Yu, PL
    Tsai, PL
    Chan, MH
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) : 1618 - 1626