An Improved Anonymous Buyer-Reseller Watermarking Protocol
نویسندگان
چکیده
Although digital watermarking protocols have been studied extensively for achieving copyright protection over the Internet for many years, the new issue of secondhand watermarking protocols has been largely ignored. Cheung and Curreem first proposed a buyer-reseller watermarking protocol for digital content redistribution in the second-hand markets. Later, Chen et al. showed that Cheung and Curreem’s scheme is vulnerable to malicious attacks and further proposed a simple improvement. However, in this paper, we show that the aforementioned schemes are still insecure, specifically by seller cheating problems, and propose an improved one. Moreover, the proposed scheme accounts for requirements of anonymity, unlinkability, coalition-resistance, and traitor traceability.
منابع مشابه
A buyer-seller watermarking protocol
Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer...
متن کاملAnonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism
Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute...
متن کاملA Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
Buyer-seller watermarking protocols allow copyright protection of digital goods. To protect privacy, some of those protocols provide buyers with anonymity. However, anonymous e-commerce protocols pose several disadvantages, like hindering customer management or requiring anonymous payment mechanisms. Additionally, no existing buyer-seller watermarking protocol provides fair exchange. We propose...
متن کاملSecrecy of Steganographic Matrix Embedding Phillip
the secure embedding scheme (see Section II), it is hard to generate a watermarked version of c which has a low correlation with k 0. An estimation attack usually yields a watermarked object that still correlates well with k 0 ; a judge will reject the accusation on such an object, as it can only originate from a malicious seller (k 0 is only available to the seller). • Finally, can attempt to ...
متن کاملAn Efficient and Impartial Buyer-Seller Watermarking Protocol
Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. To be efficient and fair is important to buyer-seller protocols. In this paper, an anonymous and interactive buyer-seller protocol is proposed, which is designed to be impartial and efficient. To solve the unbinding problem and the buyers’ right problem, operations of water...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016