Security scheme research of digital products online transactions

This paper analyses the problems that the transaction scheme of existing digital products existed. We propose a relatively perfect transaction scheme. In the scheme, combining digital watermarking and fingerprinting with digital signatures, a relatively less amount of information is embedded in a digital product , so as to reduce phenomena of descending quality, as well as issues of mutual interference, and improve efficiency Before the trade, a robust symmetric watermarking was embedded in a product sample and get a new product. Then the new product is signed. Thus online buyer may verify legitimate copyright and find timely pirated products. During the trade, after an asymmetric digital fingerprinting was embedded in the digital product, could trace pirate by the trade fingerprint, could prevent merchant from bring a false charge against the buyer, and could also have an anonymous property for the buyer.

[1]  Cui Xiaoyu Asymmetric Digital Watermark , 2001 .

[2]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[3]  Chin-Chen Chang,et al.  An enhanced buyer seller watermarking protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[4]  He Wenhua A Buyer-seller Protocol Based on Digital Watermarking , 2006 .

[5]  Robert H. Deng,et al.  Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity , 2004, ACNS.

[6]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[7]  Kasteelpark Arenberg,et al.  BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM , 2010 .

[8]  Minoru Kuribayashi,et al.  A New Anonymous Fingerprinting Scheme with High Enciphering Rate , 2001, INDOCRYPT.