Buyer-seller watermarking protocols with off-line trusted parties

被引:0
|
作者
Fan, Chun-, I [1 ]
Chen, Ming-Te [1 ]
Sun, Wei-Zhe [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, 70 Lien Hai Rd, Kaohsiung 804, Taiwan
关键词
anonymity; copyright; digital right management; watermarks;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In a buyer-seller watermarking protocol, buyers and sellers protect the ownerships or copyrights of their digital images or contents through the watermarks embedded in these images or contents. However, some attacks, such as the binding attack and the customer right problem, are threatening the security of the watermarking mechanisms. Moreover, the privacy of the buyers is not fully protected and the dispute between the buyers and the sellers cannot be fairly resolved. Although several buyer-seller watermarking protocols have been introduced in the literature, none can cope with all of the above problems. In this paper, we propose a novel buyer-seller watermarking protocol with an off-line trusted third party that can withstand these attacks and resolve the dispute between the buyers and the sellers fairly. Furthermore, our proposed protocol can guarantee the anonymity of the buyers as well.
引用
收藏
页码:1035 / +
页数:2
相关论文
共 50 条
  • [1] Buyer-seller watermarking protocols with off-line trusted third parties
    Fan, Chun-I
    Chen, Ming-Te
    Sun, Wei-Zhe
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (01) : 36 - 43
  • [2] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [3] Cloud-based Buyer-Seller Watermarking Protocols
    Peng, Yi-Jia
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [4] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [5] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [6] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [7] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [8] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [9] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [10] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity
    Deng, Mina
    Preneel, Bart
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +