Research on secure buyer-seller watermarking protocol

A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party.

[1]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[2]  Liu Quan,et al.  Researches on uniform meaningful watermark , 2002, 6th International Conference on Signal Processing, 2002..

[3]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[4]  Oscar C. Au,et al.  A blind watermarking technique for multiple watermarks , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[5]  Robert H. Deng,et al.  Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity , 2004, ACNS.

[6]  David Chaum,et al.  An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.

[7]  Yong-Zhong He Publicly Verifiable Zero-Knowledge Watermark Detection , 2005 .

[8]  Chin-Chen Chang,et al.  An enhanced buyer seller watermarking protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[9]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[10]  I. Pitas,et al.  The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.

[11]  Shing-Chi Cheung,et al.  A commutative encrypted protocol for the privacy protection of watermarks in digital contents , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[12]  Shing-Chi Cheung,et al.  Rights protection for digital contents redistribution over the Internet , 2002, Proceedings 26th Annual International Computer Software and Applications.

[13]  Kouichi Sakurai,et al.  Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.

[14]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[15]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[16]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[17]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[18]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[19]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.