12 research outputs found

    Secure buyer - seller watermarking protocol

    Full text link
    In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that a protocol is fair to both the seller and buyer in a digital content transaction. However, the TTP decreases the security and affects the protocol implementation. To address this issue, in this article a secure buyer&ndash;seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer. Based on the idea of sharing a secret, a watermark embedded in digital content to trace piracy is composed of two pieces of secret information, one produced by the seller and one by the buyer. Since neither knows the exact watermark, the buyer cannot remove the watermark from watermarked digital content, and at the same time the seller cannot fabricate piracy to frame an innocent buyer. In other words, the proposed protocol can trace piracy and protect the customer&rsquo;s rights. In addition, because no third party is introduced into the proposed protocol, the problem of a seller (or a buyer) colluding with a third party to cheat the buyer (or the seller), namely, the conspiracy problem, can be avoided.<br /

    An enhanced watermarking protocol for electronic copyright management

    Full text link
    In Piva et al\u27s watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named &quot;One Document to Multi-distributor&quot; problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al\u27s scheme by introducing document nature code (DNC) and register records table. In addition, our protocol offers the distributor an efficient means to verify his right to an authorized digital document.<br /

    Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents

    Get PDF
    In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of security is a major concern. Security in this setting encompasses both in the interest of the human users as well as their information and objects that they own. A typical kind of transaction interaction among users and/or machines in these environments is that of exchanging digital objects via purchases and/or ownership transfers, e.g. someone buying a song from iTunes via his iPhone, or downloading either bought or rented movies onto a portable DVD player. Here, there is a need to provide trustworthy protection of the rights of both parties; i.e. the seller’s copyright needs to be protected against piracy, while on the other hand it has been highlighted in literature the need to protect innocent buyers from being framed. Indeed, if either party cannot be assured that his rights are protected when he is involved in transactions within such environments, he would shy away and instead prefer for instance the more conventional non-digital means of buying and selling. And therefore without active participation from human users and object owners it is difficult to fully kick off the actual realization of intelligent environments. Zhang et al. recently proposed a buyer–seller watermarking protocol without a trusted third party based on secret sharing. While it is a nice idea to eliminate the need of a trusted third party by distributing secret shares between the buyer and the seller such that neither party has knowledge of the fingerprint embedded in a content, we show that it is possible for a buyer to remove his part of the fingerprint from the content he bought. This directly disproves the piracy tracing property claimed by the protocol. In fact, since piracy tracing is one of the earliest security applications of watermarking schemes, it raises doubts as to the soundness of the design of this protocol

    (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005

    Get PDF
    We analyze the security of a fingerprinting scheme proposed at IWDW 2005. We show two results, namely that this scheme (1) does riot provide seller security: a dishonest buyer can repudiate the fact that, he redistributed a content, and (2) does riot, provide buyer security: a buyer can be framed by a malicious seller

    Multiparty multilevel watermarking protocol for digital secondary market based on iris recognition technology

    Get PDF
    Background: In order to design secure digital right management architecture between different producers and different consumers, this paper proposes a multiparty and multilevel watermarking protocol for primary and secondary market. Comparing with the traditional buyer-seller watermarking protocols, this paper makes several outstanding achievements. Method: First of all, this paper extends traditional buyer-seller two-party architecture to multiparty architecture which contains producer, multiply distributors, consumers, etc. Secondly, this paper pays more attention on the security issues, for example, this paper applies iris recognition technology as an advanced security method. Conclusion: Finally, this paper also presents a second-hand market scheme to overcome the copyright issues that may happen in the real world. © 2017 Bentham Science Publishers

    A High Security Buyer-Seller Watermark Protocol based on Iris Biometric

    Get PDF
    With the development of digital watermarking technology, digital watermarking protocol is now drawing the attention for protecting copyrights of digital products. However, the copyright protection is fully protected by watermark technology if it is employed a suitable protocol between the rights owner and the customer. Therefore, currently, there are a number of buyer-seller watermarking protocols proposed, however, an anonymous problem and collusion problem are still unsolved completely. Thus, this paper proposes a high security watermark protocol based on iris biometric for resolving these problems. In addition, this paper also produces watermarking generation mechanism which aims to improve the efficiency of the whole mechanism. Finally, the investigation indicates that the proposed buyer-seller watermark protocol takes care of the security concerns of all parties involved, and the proposed scheme could also find an illegal copy of the content, the violators can be traced back

    Buyer-seller watermarking protocol in digital cinema

    Get PDF
    Master'sMASTER OF SCIENC
    corecore