A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

[1]  Ali N. Akansu,et al.  A robust protocol for proving ownership of multimedia content , 2004, IEEE Transactions on Multimedia.

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[4]  I. Jolliffe Principal Component Analysis , 2002 .

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[7]  Jean-Franois Cardoso High-Order Contrasts for Independent Component Analysis , 1999, Neural Computation.

[8]  Dan Yu,et al.  A New Blind Watermarking Technique Based on Independent Component Analysis , 2002, IWDW.

[9]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[10]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[11]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[12]  Harold H. Szu,et al.  Multimedia authenticity with ICA watermarks , 2000, SPIE Defense + Commercial Sensing.

[13]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[14]  Aapo Hyvärinen,et al.  Survey on Independent Component Analysis , 1999 .

[15]  Taejeong Kim,et al.  Transformed-key asymmetric watermarking system , 2001, IS&T/SPIE Electronic Imaging.

[16]  Neal Koblitz,et al.  Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.

[17]  Steve Burnett,et al.  RSA Security's official guide to cryptography , 2001 .

[18]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[19]  Stefan Katzenbeisser On the Integration of Watermarks and Cryptography , 2003, IWDW.

[20]  Pierre Duhamel,et al.  An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..

[21]  Matt L. Miller Is asymmetric watermarking necessary or sufficient? , 2002, 2002 11th European Signal Processing Conference.

[22]  Te-Won Lee,et al.  Independent Component Analysis , 1998, Springer US.