Results 1 - 10
of
25
An efficient buyer-seller watermarking protocol based on composite signal representation
- in Proc. 11th ACMWorkshop on Multimedia and Security., Princeton, NJ,2009
"... Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal repr ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
(Show Context)
Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal representation in the encrypted domain. A recently proposed composite signal representation al-lows us to reduce both the computational overhead and the large communication bandwidth which are due to the use of homomor-phic public-key encryption schemes. Both complexity analysis and simulation results confirm the efficiency of the proposed solution, suggesting that this technique can be successfully used in practical applications.
Anonymous buyer-seller watermarking protocol with additive homomorphism
- In Proc. of International Conference on Signal Processing and Multimedia Applications
, 2008
"... Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorph ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
(Show Context)
Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute resolution, non-framing, and non-repudiation. Another distinct feature is the improvement of the protocol’s utility, such that the double watermark insertion mechanism is avoided; the final quality of the distributed content is improved; the com-munication expansion ratio and computation complexity are reduced, comparing with conventional schemes. 1
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol
- In 10th ACM Workshop on Multimedia and Security
, 2008
"... In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing a model using the process algebra CSP. By describing our model in this manner and utilising the tool support associated with CSP we are able to conduct a thorough analysis of all the possible behaviour in the protocol. Through formal analysis we have discovered an unbinding attack on the protocol. In this paper we also highlight other weaknesses that exist in the protocol and propose verifiable solutions to correct these weaknesses.
Attacks on two buyerseller watermarking protocols and an improvement for revocable anonymity
- Electronic Commerce and Security, International Symposium
, 2008
"... Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently propo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-com-merce. In this paper, we present attacks on two recently proposed buyer-seller watermarking protocols, and prove that these protocols are not able to provide security for both the buyer and the seller simultaneously. Further, we point out that both protocols don't function properly when employing homomorphic probabilistic cryptosystems. We also show that neither the buyer's anonymity nor the transaction unlinkability is achieved in these protocols. We propose an improved secure and anonymous buyer-seller protocol, which is secure and fair for both the seller and the buyer. In contrast to early work, our scheme is able to pro-vide all the security properties that a secure buyer-seller watermarking protocol is expected to hold. Index Terms—e-commerce, security, watermarking proto-col, anonymity, applied cryptography I.
A secure and efficient buyerseller watermarking protocol
- Journal of Multimedia
, 2009
"... Abstract—The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller. Besides, in order to guarantee the anonymity of the buyer, the WCA can provide the buyer with an encrypted digital certificate and have it submitted directly to the seller by the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the conspiracy problem, the dispute problem. The analyses indicate that the proposed protocol is secure and practical. Index Terms—copyright protection,digital watermarking, secure protocol I.
G.S.: An anonymous watermarking scheme for content distribution protection using trusted computing
- In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2007
"... Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve t ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we present an anonymous CDP watermarking scheme, which minimises the reliance on a Trusted Third Party. Our scheme allows a buyer to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing content illegally. 1
Secret sharing in the encrypted domain
- Proceedings of the 46th IEEE International Conference on Communications - ICC 2011
, 2011
"... Abstract—Secret sharing refers to dividing a secret into pieces or shares and allocating the shares among a group of participants. The secret can be reconstructed only when a sufficient number of shares are combined. To protect each share during secret reconstruction, it is desirable to reconstruct ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Secret sharing refers to dividing a secret into pieces or shares and allocating the shares among a group of participants. The secret can be reconstructed only when a sufficient number of shares are combined. To protect each share during secret reconstruction, it is desirable to reconstruct the secret directly from the encrypted shares. A composite algorithm using binary representation and precomputation is developed for efficient exponentiation of encrypted data. A new scheme of secret sharing in the encrypted domain is proposed that makes use of the efficient exponentiation algorithm. Experimental results verify the effectiveness of the efficient exponentiation algorithm and the scheme of secret sharing in the encrypted domain. Index Terms—Secret sharing, encrypted domain processing, information security, probabilistic encryption, homomorphic en-cryption, public key cryptosystem. I.
ON THE IMPLEMENTATION OF ASYMMETRIC FINGERPRINTING PROTOCOL
"... Digital ngerprinting of multimedia contents involves the generation of a ngerprint, the embedding operation, and the realization of traceability from redistributed contents. Con-sidering a buyer’s right, the asymmetric property in the trans-action between a buyer and a seller must be achieved using ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Digital ngerprinting of multimedia contents involves the generation of a ngerprint, the embedding operation, and the realization of traceability from redistributed contents. Con-sidering a buyer’s right, the asymmetric property in the trans-action between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking algorithm into the cryp-tographic protocol is not deeply discussed. In this paper, we propose the method for implementing the spread spec-trum watermarking technique in the ngerprinting protocol based on the homomorphic encryption scheme, and evaluate the performance by simulation. 1.
A Web Service for Signing and Authenticating Digital Documents based on Symmetric Cryptography Protocol
"... ..."
(Show Context)
On the Implementation of the Discrete Fourier Transform in the Encrypted Domain
"... Abstract-Signal processing modules working directly on encrypted data provide an elegant solution to application scenarios where valuable signals must be protected from a malicious processing device. In this paper, we investigate the implementation of the discrete Fourier transform (DFT) in the enc ..."
Abstract
- Add to MetaCart
Abstract-Signal processing modules working directly on encrypted data provide an elegant solution to application scenarios where valuable signals must be protected from a malicious processing device. In this paper, we investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain, by using the homomorphic properties of the underlying cryptosystem. Several important issues are considered for the direct DFT, the radix-2, and the radix-4 fast Fourier algorithms, including the error analysis and the maximum size of the sequence that can be transformed. We also provide computational complexity analyses and comparisons. The results show that the radix-4 FFT is best suited for an encrypted domain implementation in the proposed scenarios.