Formal Analysis of Two Buyer-Seller Watermarking Protocols

被引:0
|
作者
Williams, David M. [1 ]
Treharne, Helen [1 ]
Ho, Anthony T. S. [1 ]
Waller, Adrian [2 ]
机构
[1] Univ Surrey, Guildford GU2 7XH, Surrey, England
[2] Thales Res & Technol UK Ltd, Reading RG2 OSB, Berks, England
来源
DIGITAL WATERMARKING | 2009年 / 5450卷
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we demonstrate how the formal model constructed in Our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, dean filled ill the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as, all example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al. [5] on the Memon and Wong protocol and we identify a new unbinding attack oil the protocol proposed by Shao.
引用
收藏
页码:278 / +
页数:2
相关论文
共 50 条
  • [1] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [2] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity
    Deng, Mina
    Preneel, Bart
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +
  • [3] Cloud-based Buyer-Seller Watermarking Protocols
    Peng, Yi-Jia
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [4] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [5] Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    Goi, BM
    Phan, RCW
    Yang, YJ
    Bao, F
    Deng, RH
    Siddiqi, MU
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 369 - 382
  • [6] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [7] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [8] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [9] Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
    Goi, Bok-Min
    Phan, Raphael C. -W.
    Chuah, Hean-Teik
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 951 - +
  • [10] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740