Advertisement

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

  • Fawad AhmedEmail author
  • Farook Sattar
  • Mohammed Yakoob Siyal
  • Dan Yu
Open Access
Research Article

Abstract

We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

Keywords

Information Technology Quantum Information Watermark Image Watermark Scheme Copyright Protection 

References

  1. 1.
    Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.Google Scholar
  2. 2.
    Cox IJ, Kilian J, Leighton FT, Shamoon TG: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673–1687. 10.1109/83.650120CrossRefGoogle Scholar
  3. 3.
    Furon T, Venturini I, Duhamel P: A unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 269–279.CrossRefGoogle Scholar
  4. 4.
    Furon T, Duhamel P: An asymmetric watermarking method. IEEE Transactions on Signal Processing 2003, 51(4):981–995. 10.1109/TSP.2003.809376MathSciNetCrossRefGoogle Scholar
  5. 5.
    Eggers JJ, Su JK, Girod B: Public key watermarking by eigenvectors of linear transforms. Proceedings of the European Signal Processing Conference (EUSIPCO '00), September 2000, Tampere, FinlandGoogle Scholar
  6. 6.
    Choi H, Lee K, Kim T: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 2004, 11(2):251–254. 10.1109/LSP.2003.819873CrossRefGoogle Scholar
  7. 7.
    Miller ML: Is asymmetric watermarking necessary or sufficient? Proceedings of the European Signal Processing Conference (EUSIPCO '02), September 2002, Toulouse, FranceGoogle Scholar
  8. 8.
    Ramkumar M, Akansu AN: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 2004, 6(3):469–478. 10.1109/TMM.2004.827494CrossRefGoogle Scholar
  9. 9.
    Katzenbeisser S: On the integration of cryptography and watermarks. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2939: 50–60.CrossRefGoogle Scholar
  10. 10.
    Memon N, Wong PW: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 2001, 10(4):643–649. 10.1109/83.913598CrossRefGoogle Scholar
  11. 11.
    Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120–126. 10.1145/359340.359342MathSciNetCrossRefGoogle Scholar
  12. 12.
    Koblitz N: Algebraic Aspects of Cryptography. Springer, Berlin, Germany; 1998.CrossRefGoogle Scholar
  13. 13.
    Schneier B: Applied Cryptography. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.zbMATHGoogle Scholar
  14. 14.
    Burnett S, Paine S: RSA Security's Official Guide to Cryptography. Osborne/McGraw-Hill, Emeryville, Calif, USA; 2001.Google Scholar
  15. 15.
    Hyvärinen A: Survey on independent component analysis. Neural Computing Surveys 1999, 2: 94–128.Google Scholar
  16. 16.
    Lee T-W: Independent Component Analysis—Theory and Applications. Kluwer Academic, Dordrecht, The Netherlands; 1998.CrossRefGoogle Scholar
  17. 17.
    Jolliffre IT: Principal Component Analysis. Springer, Berlin, Germany; 2002.Google Scholar
  18. 18.
    Noel SE, Szu HH: Multimedia authenticity with ICA watermarks. Wavelet Applications VII, April 2000, Orlando, Fla, USA, Proceedings of SPIE 4056: 175–184.CrossRefGoogle Scholar
  19. 19.
    Yu D, Sattar F: A new blind watermarking technique based on independent component analysis. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2613: 51–63.CrossRefGoogle Scholar
  20. 20.
    Mintzer F, Braudaway GW: If one watermark is good, are more better? IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999, Phoenix, Ariz, USA 4: 2067–2069.Google Scholar
  21. 21.
    Cardoso J-F: High-order contrasts for independent component analysis. Neural Computation 1999, 11(1):157–192. 10.1162/089976699300016863MathSciNetCrossRefGoogle Scholar
  22. 22.
    Carver S, Memon N, Yeo B-L, Yeung MM: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 1998, 16(4):573–586. 10.1109/49.668979CrossRefGoogle Scholar
  23. 23.
    Ramkumar M, Akansu AN: Image watermarks and counterfeit attacks: some problems and solutions. Proceedings of Content Security and Data Hiding in Digital Media, May 1999, Newark, NJ, USAGoogle Scholar

Copyright information

© Ahmed et al. 2006

Authors and Affiliations

  • Fawad Ahmed
    • 1
    Email author
  • Farook Sattar
    • 1
  • Mohammed Yakoob Siyal
    • 1
  • Dan Yu
    • 1
  1. 1.School of Electrical and Electronic EngineeringNanyang Technological UniversityNanyang AvenueSingapore

Personalised recommendations