An enhanced buyer seller watermarking protocol

被引:0
|
作者
Chang, CC [1 ]
Chung, CY [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
digital watermark; watermarking protocol; copyright protection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarks are helpful about the possession identification as well as copyright and intellectual property protection for tons and. tons of multimedia data transmitted through the Internet. In a buyer-seller watermarking protocol, both seller and buyer have to insert their watermarks into a copy. If unauthorized parties have drifted into market, the watermark detection and extraction algorithm will both identify exactly who has the legal ownership of that copy and trace back to the illegal reseller. In Memon and Wong's protocol, the seller is responsible for watermarks insertion, but she/he has no idea what the buyer's watermark is. As a result, the seller has no way to forge the buyer's watermark. However, the seller doesn't have to use her/his own private information in the watermark insertion process. This may bring about the problem of man in the middle attack. Besides, in their protocol, if them is a dispute, a judge is a must. To improve those shortcomings, we shall propose a new scheme where the seller has to use her/his own private key to do the watermark insertion job. In our scheme, everyone can be the judge if there is a quarrel over the copyright. This provides a simple and fair solution to the judgment of copy deterrence.
引用
收藏
页码:1779 / 1783
页数:5
相关论文
共 50 条
  • [31] Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
    Raphael C.-W. Phan
    Jongsung Bok-Min Goi
    [J]. Wireless Personal Communications, 2011, 56 : 73 - 83
  • [32] A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
    Kumar, Ashwani
    Ansari, Mohd Dilshad
    Ali, Jabir
    Kumar, Kapil
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 468 - 471
  • [33] A new buyer-seller watermarking protocol without double embedding
    Zeng P.
    Cao Z.-F.
    Lin H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2010, 15 (4) : 397 - 402
  • [34] Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Poh, Geong-Sen
    Kim, Jongsung
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 73 - 83
  • [35] Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
    Goi, BM
    Phan, RCW
    Siddiqi, MU
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 936 - 944
  • [36] An Efficient Buyer-Seller Watermarking Protocol Based on Composite Signal Representation
    Deng, Mina
    Bianchi, Tiziano
    Piva, Alessandro
    Preneel, Bart
    [J]. MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2009, : 9 - 18
  • [37] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Jyun-Ci Huang
    Fuh-Gwo Jeng
    Tzung-Her Chen
    [J]. Multimedia Tools and Applications, 2017, 76 : 9667 - 9679
  • [38] A new buyer-seller watermarking protocol without multiple watermarks insertion
    Huang, Jyun-Ci
    Jeng, Fuh-Gwo
    Chen, Tzung-Her
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9667 - 9679
  • [39] Mobile 3D game contents watermarking based on buyer-seller watermarking protocol
    Kwon, Seong-Geun
    Lee, Suk-Hwan
    Kwon, Ki-Ryong
    Lee, Eung-Joo
    Ok, Soo-Yol
    Bae, Sung-Ho
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (07): : 2018 - 2026
  • [40] A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications
    Choi, J
    Park, J
    [J]. DIGITAL WATERMARKING, 2005, 3304 : 232 - 243