Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection

被引:0
|
作者
Goi, Bok-Min [1 ]
Phan, Raphael C. -W. [2 ]
Chuah, Hean-Teik [1 ]
机构
[1] Multimedia Univ, CCIS, Fac Engn, Cyberjaya 63100, Malaysia
[2] LASEC, EPFL, Lausanne, Switzerland
关键词
security issues in UMS; authentication in UMS; content protection and DRM; protocol; digital watermarking and fingerprinting;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including multimedia services in real time from the comfort of their homes e.g. payTV and interactive TV, streaming audiovisuals, video conferencing and video phones, interactive gaming and online merchandising. With this vast amount of multimedia content being distributed in the environment, there is a need to provide protection for the content from piracy and illegal duplication, which is an important security issue if the UE is to gain popularity and widespread usage. One method to provide content protection and tracing of illegal duplications is using buyer-seller watermarking protocols. In particular, owner-specific marks are embedded into the content to allow content protection and buyer-specific marks are embedded to trace illegal duplications. Two such protocols were independently proposed by Chang and Chung, and Cheung et al., at ICCT 2003 and HICSS 2004, respectively. We show that both the seller's and buyer's rights are not protected in both protocols and therefore the protocols fail to provide even the most basic security requirement of buyer-seller protocols. It is important that these protocols not be deployed for securing UE, but to undergo redesign and thorough security analysis before being reconsidered.
引用
收藏
页码:951 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    Goi, BM
    Phan, RCW
    Yang, YJ
    Bao, F
    Deng, RH
    Siddiqi, MU
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382
  • [2] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [3] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [4] Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
    Goi, BM
    Phan, RCW
    Siddiqi, MU
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 936 - 944
  • [5] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [6] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +
  • [7] An efficient and anonymous buyer-seller watermarking protocol
    Lei, CL
    Yu, PL
    Tsai, PL
    Chan, MH
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) : 1618 - 1626
  • [8] A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
    Rial, Alfredo
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 920 - 931
  • [9] Anonymous buyer-seller watermarking protocol with additive homomorphism
    Deng, Mina
    Weng, Li
    Preneel, Bart
    [J]. SIGMAP 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2008, : 300 - 307
  • [10] An anonymous buyer-seller watermarking protocol with anonymity control
    Ju, HS
    Kim, HJ
    Lee, DH
    Lim, JI
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 421 - 432