Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks
نویسندگان
چکیده
Buyer-seller watermarking are protocols guaranteeing the buyer prevents false infringement accusations and the seller protects the watermark secrets from the buyer. Most recently, Chang et al. proposed an efficient and fair buyer-seller watermarking scheme for large scale networks quite recently. In this correspondence, we first shows its three weaknesses: the buyer can easily remove the watermark, the buyer can easily destroy the forensic information and the adversary can possibly learn about personal privacy of some honest customers. Thereafter, we suggest some countermeasures to defeat our described attacks while its merits are left unchanged.
منابع مشابه
A practical and secure buyer-seller watermarking protocol
AbstrAct: Digital watermarking is an emerging technology for combating copyright piracy. In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an inno cent buyer. In this paper, we propose a new buyer-s...
متن کاملAn ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection
Digital watermarking protocols are the one, which have combined fingerprinting technique with watermarking, for embedding digital signal or watermark into an original multimedia object. Buyer-seller watermarking protocol is fundamentally applied to continue the digital rights of both buyers and seller. We proposed an identity-based buyer-seller watermarking protocol that encounters various weak...
متن کاملA Verifiable and Secret Buyer-seller Watermarking Protocol
A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer–seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, ...
متن کاملA buyer-seller watermarking protocol
Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer...
متن کاملA Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
Buyer-seller watermarking protocols allow copyright protection of digital goods. To protect privacy, some of those protocols provide buyers with anonymity. However, anonymous e-commerce protocols pose several disadvantages, like hindering customer management or requiring anonymous payment mechanisms. Additionally, no existing buyer-seller watermarking protocol provides fair exchange. We propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2012