A buyer-seller watermarking protocol

Digital watermarks have previously been proposed for the purpose of copy protection and copy deterrence for multimedia content. Copy deterrence using digital watermarks is achieved by inserting a unique watermark into each copy of the watermark content sold which could be used to trace unauthorized copies to the erring buyer. One problem with such an approach is the fact that the buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyers watermark. However, in case the seller finds an unauthorized copy, he/she can identify the buyer from whom this unauthorized copy has originated and furthermore can also prove this fact to a third party by means of a dispute resolution protocol. Hence, the buyer cannot claim that an unauthorized copy may have originated from the seller.

[1]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[2]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[3]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[4]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[5]  Sushil Jajodia,et al.  Recovery of Watermarks from Distorted Images , 1999, Information Hiding.

[6]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[7]  Ton Kalker Digital video watermarking for DVD copy protection , 1999, Optics East.

[8]  Gordon W. Braudaway,et al.  Automatic recovery of invisible image watermarks from geometrically distorted images , 2000, J. Electronic Imaging.

[9]  I. Pitas,et al.  The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.

[10]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[13]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[14]  Michael J. Fischer,et al.  A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[15]  Nasir D. Memon,et al.  Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System , 1999, Electronic Imaging.

[16]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[17]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[18]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[19]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[20]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[21]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[22]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[23]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[24]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..