In this paper, with current cryptography theory and watermarking technology of vector spatial data, we design a watermarking protocol for vector spatial data. This protocol combines trusted third party protocol and buyer-seller protocol. In this protocol, digital signature technique is employed to identity buyer and seller involved in the trade of spatial data product. Trusted third party transforms watermark information used in the trade to ensure the secrecy. Anonymous mechanism is employed in this protocol, the buyer has the anonymity to protect its privacy. In the watermark embedding process, we make the embedding operation and the encrypted operation into an atomic operation, to protect the interests of consumers. In addition, all information is encrypted to prevent disclosure in every stage of the trade. After theoretical analysis, it shows that this protocol can solve the security aspects of watermarking protocol and can resist all kinds of attacks against the protocol.
[1]
Nasir D. Memon,et al.
A buyer-seller watermarking protocol
,
2001,
IEEE Trans. Image Process..
[2]
Nasir D. Memon,et al.
A buyer-seller watermarking protocol
,
1998,
1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[3]
Klara Nahrstedt,et al.
Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
,
1998,
J. Vis. Commun. Image Represent..
[4]
Kasteelpark Arenberg,et al.
BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM
,
2010
.
[5]
Joshua D. Guttman,et al.
Strand spaces: why is a security protocol correct?
,
1998,
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6]
Chin-Chen Chang,et al.
An enhanced buyer seller watermarking protocol
,
2003,
International Conference on Communication Technology Proceedings, 2003. ICCT 2003..