Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol

被引:19
|
作者
Zhao, Bin [1 ,2 ]
Kou, Weidong [2 ,3 ]
Li, Hui [4 ]
Dang, Lanjun [4 ]
Zhang, Jun [5 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] IBM Corp, Growth Market Unit, Global Alliance Solut, Cloud, Beijing 100027, Peoples R China
[4] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
[5] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Digital watermarking; Watermarking protocol; Signal processing in the encrypted domain; Multimedia security; Copyright protection; DIGITAL WATERMARKING; COMPRESSION; SECURE; JPEG;
D O I
10.1016/j.ins.2010.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor's identity can be traced by the embedded watermark However, it incurs both repudiation issue and framing Issue To solve these problems, some buyer-seller watermarking protocols have been proposed based on watermarking scheme in the encrypted domain. In this paper, an enhanced watermarking scheme is presented Compared with Solanki et al.'s scheme, the enhanced scheme increases effective watermarking capacity, avoids additional overhead and overcomes an inherent flaw that watermarking capacity depends on the probability distribution of input watermark sequence Based on the security requirements of buyer-seller watermarking protocols, a new watermarking scheme in the encrypted domain with flexible watermarking capacity is proposed. It improves the robustness of watermark sequence against image compressions and enables image tampering detection. Watermark extraction is blind, which employs the same threshold criterion and secret keys as watermark embedding. Experimental results demonstrate that the enhanced watermarking scheme eliminates the drawbacks of Solanki et al's scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme. (C) 2010 Elsevier Inc All rights reserved
引用
收藏
页码:4672 / 4684
页数:13
相关论文
共 50 条
  • [1] Dual Watermarking Scheme For Secure Buyer-Seller Watermarking Protocol
    Mehra, Neelesh
    Shandilya, Madhu
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [2] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [3] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [4] A Lightweight Buyer-Seller Watermarking Protocol
    Wu, Yongdong
    Pang, Hweehua
    [J]. ADVANCES IN MULTIMEDIA, 2008, 2008
  • [5] Research on secure buyer-seller watermarking protocol
    Liu Quan
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 370 - 376
  • [6] A Secure and Efficient Buyer-seller Watermarking Protocol
    Fu, Lingyun
    Hu, Defa
    Wang, Xiaoliang
    Chen, Jianli
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 898 - +
  • [7] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [8] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +
  • [9] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    [J]. IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [10] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    [J]. ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557