Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol

被引:19
|
作者
Zhao, Bin [1 ,2 ]
Kou, Weidong [2 ,3 ]
Li, Hui [4 ]
Dang, Lanjun [4 ]
Zhang, Jun [5 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] IBM Corp, Growth Market Unit, Global Alliance Solut, Cloud, Beijing 100027, Peoples R China
[4] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
[5] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Digital watermarking; Watermarking protocol; Signal processing in the encrypted domain; Multimedia security; Copyright protection; DIGITAL WATERMARKING; COMPRESSION; SECURE; JPEG;
D O I
10.1016/j.ins.2010.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor's identity can be traced by the embedded watermark However, it incurs both repudiation issue and framing Issue To solve these problems, some buyer-seller watermarking protocols have been proposed based on watermarking scheme in the encrypted domain. In this paper, an enhanced watermarking scheme is presented Compared with Solanki et al.'s scheme, the enhanced scheme increases effective watermarking capacity, avoids additional overhead and overcomes an inherent flaw that watermarking capacity depends on the probability distribution of input watermark sequence Based on the security requirements of buyer-seller watermarking protocols, a new watermarking scheme in the encrypted domain with flexible watermarking capacity is proposed. It improves the robustness of watermark sequence against image compressions and enables image tampering detection. Watermark extraction is blind, which employs the same threshold criterion and secret keys as watermark embedding. Experimental results demonstrate that the enhanced watermarking scheme eliminates the drawbacks of Solanki et al's scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme. (C) 2010 Elsevier Inc All rights reserved
引用
收藏
页码:4672 / 4684
页数:13
相关论文
共 50 条
  • [21] A watermarking scheme in the encrypted domain for watermarking protocol
    Zhao, Bin
    Dang, Lanjun
    Kou, Weidong
    Zhang, Jun
    Li, Zan
    Fan, Kai
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 442 - +
  • [22] A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
    Fawad Ahmed
    Farook Sattar
    Mohammed Yakoob Siyal
    Dan Yu
    [J]. EURASIP Journal on Advances in Signal Processing, 2006
  • [23] A New Buyer-Seller Watermarking Protocol Without Double Embedding
    曾鹏
    曹珍富
    林煌
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (04) : 397 - 402
  • [24] An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption
    Sen Poh, Geong
    Martin, Keith M.
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 433 - 447
  • [25] A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
    Kumar, Ashwani
    Ansari, Mohd Dilshad
    Ali, Jabir
    Kumar, Kapil
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 468 - 471
  • [26] A secure watermarking scheme for buyer-seller identification and copyright protection
    Ahmed, Fawad
    Sattar, Farook
    Siyal, Mohammed Yakoob
    Yu, Dan
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 2006 (1)
  • [27] A new buyer-seller watermarking protocol without double embedding
    Zeng P.
    Cao Z.-F.
    Lin H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2010, 15 (4) : 397 - 402
  • [28] Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol
    Lee, Suk-Hwan
    Kwon, Seong-Geun
    Kwon, Ki-Ryong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (02): : 504 - 523
  • [29] Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
    Goi, BM
    Phan, RCW
    Siddiqi, MU
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 936 - 944
  • [30] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260