A buyer-seller watermarking protocol

被引:203
|
作者
Memon, N
Wong, PW
机构
[1] Polytech Univ, Brooklyn, NY 11201 USA
[2] Apalo Com, Hong Kong, Hong Kong, Peoples R China
关键词
copy deterrence; digital watermarking; fingerprinting; watermarking protocols;
D O I
10.1109/83.913598
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content, In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol, This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.
引用
收藏
页码:643 / 649
页数:7
相关论文
共 50 条
  • [11] Dual Watermarking Scheme For Secure Buyer-Seller Watermarking Protocol
    Mehra, Neelesh
    Shandilya, Madhu
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [12] A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
    Rial, Alfredo
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 920 - 931
  • [13] A buyer-seller watermarking protocol for digital secondary market
    Chunlin Song
    Jie Sang
    Sud Sudirman
    [J]. Multimedia Tools and Applications, 2018, 77 : 225 - 249
  • [14] A Buyer-Seller Watermarking Protocol Based on Secure Embedding
    Katzenbeisser, Stefan
    Lemma, Aweke
    Celik, Mehmet Utku
    van der Veen, Michiel
    Maas, Martijn
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) : 783 - 786
  • [15] Anonymous buyer-seller watermarking protocol with additive homomorphism
    Deng, Mina
    Weng, Li
    Preneel, Bart
    [J]. SIGMAP 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2008, : 300 - 307
  • [16] An anonymous buyer-seller watermarking protocol with anonymity control
    Ju, HS
    Kim, HJ
    Lee, DH
    Lim, JI
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 421 - 432
  • [17] A buyer-seller watermarking protocol for digital secondary market
    Song, Chunlin
    Sang, Jie
    Sudirman, Sud
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 225 - 249
  • [18] A web oriented and interactive buyer-seller watermarking protocol
    Frattolillo, F
    D'Onofrio, S
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [19] Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
    Zhao, Bin
    Kou, Weidong
    Li, Hui
    Dang, Lanjun
    Zhang, Jun
    [J]. INFORMATION SCIENCES, 2010, 180 (23) : 4672 - 4684
  • [20] A New Buyer-Seller Watermarking Protocol Without Double Embedding
    曾鹏
    曹珍富
    林煌
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (04) : 397 - 402