Results 1 -
5 of
5
An efficient buyer-seller watermarking protocol based on composite signal representation
- in Proc. 11th ACMWorkshop on Multimedia and Security., Princeton, NJ,2009
"... Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal repr ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
(Show Context)
Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal representation in the encrypted domain. A recently proposed composite signal representation al-lows us to reduce both the computational overhead and the large communication bandwidth which are due to the use of homomor-phic public-key encryption schemes. Both complexity analysis and simulation results confirm the efficiency of the proposed solution, suggesting that this technique can be successfully used in practical applications.
Attacks on two buyerseller watermarking protocols and an improvement for revocable anonymity
- Electronic Commerce and Security, International Symposium
, 2008
"... Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently propo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently proposed buyer-seller watermarking protocols, and prove that these protocols are not able to provide security for both the buyer and the seller simultaneously. Further, we point out that both protocols don't function properly when employing homomorphic probabilistic cryptosystems. We also show that neither the buyer's anonymity nor the transaction unlinkability is achieved in these protocols. We propose an improved secure and anonymous buyer-seller protocol, which is secure and fair for both the seller and the buyer. In contrast to early work, our scheme is able to pro-vide all the security properties that a secure buyer-seller watermarking protocol is expected to hold. Index Terms—e-commerce, security, watermarking proto-col, anonymity, applied cryptography I.
A secure and efficient buyerseller watermarking protocol
- Journal of Multimedia
, 2009
"... Abstract—The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller. Besides, in order to guarantee the anonymity of the buyer, the WCA can provide the buyer with an encrypted digital certificate and have it submitted directly to the seller by the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the conspiracy problem, the dispute problem. The analyses indicate that the proposed protocol is secure and practical. Index Terms—copyright protection,digital watermarking, secure protocol I.
A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform
"... Digital watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital c ..."
Abstract
- Add to MetaCart
Digital watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital contents. It plays a very important role in E-commerce. Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. It uses the public key encryption schemes. In this paper we propose a Practical Buyer Seller watermarking protocol based on Discrete Wavelet Transform (DWT) which is secure and flexible and gives more security from previous watermarking protocols to both buyer and seller. In this we use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. The protocol has better security property and higher efficiency.
Efficient Implementation of a Buyer-Seller Watermarking Protocol Using a Composite Signal Representation
"... Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic public ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem, and the use of composite signal representation in the encrypted domain to re-duce both the computational overhead and the large communication bandwidth which are due to the use of homomorphic public-key encryption schemes. Both complexity analysis and simulation results confirm the efficiency of the proposed solution, suggesting that this technique can be successfully used in practical ap-plications.