Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol

被引:19
|
作者
Zhao, Bin [1 ,2 ]
Kou, Weidong [2 ,3 ]
Li, Hui [4 ]
Dang, Lanjun [4 ]
Zhang, Jun [5 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] IBM Corp, Growth Market Unit, Global Alliance Solut, Cloud, Beijing 100027, Peoples R China
[4] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
[5] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Digital watermarking; Watermarking protocol; Signal processing in the encrypted domain; Multimedia security; Copyright protection; DIGITAL WATERMARKING; COMPRESSION; SECURE; JPEG;
D O I
10.1016/j.ins.2010.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor's identity can be traced by the embedded watermark However, it incurs both repudiation issue and framing Issue To solve these problems, some buyer-seller watermarking protocols have been proposed based on watermarking scheme in the encrypted domain. In this paper, an enhanced watermarking scheme is presented Compared with Solanki et al.'s scheme, the enhanced scheme increases effective watermarking capacity, avoids additional overhead and overcomes an inherent flaw that watermarking capacity depends on the probability distribution of input watermark sequence Based on the security requirements of buyer-seller watermarking protocols, a new watermarking scheme in the encrypted domain with flexible watermarking capacity is proposed. It improves the robustness of watermark sequence against image compressions and enables image tampering detection. Watermark extraction is blind, which employs the same threshold criterion and secret keys as watermark embedding. Experimental results demonstrate that the enhanced watermarking scheme eliminates the drawbacks of Solanki et al's scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme. (C) 2010 Elsevier Inc All rights reserved
引用
收藏
页码:4672 / 4684
页数:13
相关论文
共 50 条
  • [41] Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Culnane, Chris
    [J]. MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 205 - 213
  • [42] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [43] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [44] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [45] Buyer-seller watermarking protocols with off-line trusted parties
    Fan, Chun-, I
    Chen, Ming-Te
    Sun, Wei-Zhe
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1035 - +
  • [46] A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
    Shao, Min-Hua
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 44 - 53
  • [47] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity
    Deng, Mina
    Preneel, Bart
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +
  • [48] A New and Efficient Buyer-Seller Digital Watermarking Protocol Using Identity Based Technique for Copyright Protection
    Kumar, Ashwani
    Ghrera, S. P.
    Tyagi, Vipin
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 531 - 535
  • [49] Buyer-seller watermarking protocols with off-line trusted third parties
    Fan, Chun-I
    Chen, Ming-Te
    Sun, Wei-Zhe
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (01) : 36 - 43
  • [50] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    Goi, BM
    Phan, RCW
    Yang, YJ
    Bao, F
    Deng, RH
    Siddiqi, MU
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382