Results 1 -
5 of
5
Anonymous buyer-seller watermarking protocol with additive homomorphism
- In Proc. of International Conference on Signal Processing and Multimedia Applications
, 2008
"... Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorph ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
(Show Context)
Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute resolution, non-framing, and non-repudiation. Another distinct feature is the improvement of the protocol’s utility, such that the double watermark insertion mechanism is avoided; the final quality of the distributed content is improved; the com-munication expansion ratio and computation complexity are reduced, comparing with conventional schemes. 1
Attacks on two buyerseller watermarking protocols and an improvement for revocable anonymity
- Electronic Commerce and Security, International Symposium
, 2008
"... Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently propo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently proposed buyer-seller watermarking protocols, and prove that these protocols are not able to provide security for both the buyer and the seller simultaneously. Further, we point out that both protocols don't function properly when employing homomorphic probabilistic cryptosystems. We also show that neither the buyer's anonymity nor the transaction unlinkability is achieved in these protocols. We propose an improved secure and anonymous buyer-seller protocol, which is secure and fair for both the seller and the buyer. In contrast to early work, our scheme is able to pro-vide all the security properties that a secure buyer-seller watermarking protocol is expected to hold. Index Terms—e-commerce, security, watermarking proto-col, anonymity, applied cryptography I.
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction 1
"... Abstract: Due to the rapid growth of the internet and e-commerce, more and more digital products and multimedia contents are sold and transmitted over the internet. However, it also poses threats to copyright protection and to customers’ privacy.Digital watermarks are used for protecting the digital ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: Due to the rapid growth of the internet and e-commerce, more and more digital products and multimedia contents are sold and transmitted over the internet. However, it also poses threats to copyright protection and to customers’ privacy.Digital watermarks are used for protecting the digital contents from unauthorized duplication and distribution over internet. This can be achieved by inserting a unique digital watermark into each copy of the content before it is sold by the content owner (seller) to a buyer. This paper proposes a new enhanced privacy preserving Buyer-Seller watermarking protocol for anonymous transaction. Apart from solving the generic problems, this novel method is also finding solutions to Anonymity, Unlinkability and Loyalty marketing problem. I.
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005
"... Abstract. We analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does not provide seller security: a dishonest buyer can repudiate the fact that he redistributed a content, and (2) does not provide buyer security: a buyer can be fra ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. We analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does not provide seller security: a dishonest buyer can repudiate the fact that he redistributed a content, and (2) does not provide buyer security: a buyer can be framed by a malicious seller.