A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform

watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital contents. It plays a very important role in E-commerce. Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. It uses the public key encryption schemes. In this paper we propose a Practical Buyer Seller watermarking protocol based on Discrete Wavelet Transform (DWT) which is secure and flexible and gives more security from previous watermarking protocols to both buyer and seller. In this we use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. The protocol has better security property and higher efficiency. Keywordskey infrastructure; copyright protection; Digital watermarking;

[1]  Sushil K. Bhattacharjee,et al.  Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[2]  Bart Preneel,et al.  On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[3]  Jun Zhang,et al.  Secure buyer-seller watermarking protocol , 2006 .

[4]  G. Clark,et al.  Reference , 2008 .

[5]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[6]  Ioannis Pitas,et al.  Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[7]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[8]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[11]  Kouichi Sakurai,et al.  Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.

[12]  Chin-Laung Lei,et al.  An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.

[13]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[16]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.