A buyer-seller watermarking protocol

被引:1
|
作者
Memon, N [1 ]
Wong, PW [1 ]
机构
[1] Polytech Univ, Dept Comp Sci, Brooklyn, NY 11201 USA
关键词
D O I
10.1109/MMSP.1998.738949
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarks have recently been proposed for the purpose of copy protection and copy deterrence for multimedia content. Copy deterrence using digital watermarks is achieved by inserting a unique watermark into each copy of the watermark content sold which could be used to trace unauthorized copies to the erring buyer. One problem with such an approach is the fact that the buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyers watermark. However, in case the seller finds an unauthorized copy, he/she can identify the buyer from whom this unauthorized copy has originated and furthermore can also prove this fact to a third party by means of a dispute resolution protocol. Hence, the buyer cannot claim that an unauthorized copy may have originated from the seller.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [1] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [2] A Lightweight Buyer-Seller Watermarking Protocol
    Wu, Yongdong
    Pang, Hweehua
    [J]. ADVANCES IN MULTIMEDIA, 2008, 2008
  • [3] Research on secure buyer-seller watermarking protocol
    Liu Quan
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 370 - 376
  • [4] A Secure and Efficient Buyer-seller Watermarking Protocol
    Fu, Lingyun
    Hu, Defa
    Wang, Xiaoliang
    Chen, Jianli
    [J]. MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 898 - +
  • [5] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [6] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    [J]. IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [7] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +
  • [8] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +
  • [9] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    [J]. ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557
  • [10] An efficient and anonymous buyer-seller watermarking protocol
    Lei, CL
    Yu, PL
    Tsai, PL
    Chan, MH
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) : 1618 - 1626