Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party

  • Jae-Gwi Choi
  • Kouichi Sakurai
  • Ji-Hwan Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2846)

Abstract

Buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. For example, in applications where multimedia content is electronically distributed over a network, the content owner can embed a distinct watermark (a fingerprint), in each copy of the data that is distributed. If unauthorized copies of the data are found, then the origin of the copy can be determined by retrieving the unique watermark corresponding to each buyer. Recently, Ju and Kim proposed an anonymous buyer-seller watermarking protocol, where a buyer can purchase contents anonymously, but the anonymity can be controlled. They used two trusted parties: the watermark certification authority and the judge. The significance of this protocol is that it offered anonymity to watermarking protocol. But this protocol has the problem that honest buyers can be found as guilty, because sellers can recreate the same contents as the buyer’s one if he/she colludes with the watermark certification authority and the judge. Thus this scheme must assume existence of the trusted third parties for its security. In this paper, we show shortcomings of this protocol and suggest a buyer-seller watermarking protocol that provides security of buyers and sellers without trusted third party.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BS95]
    Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  2. [CD87]
    Chaum, D., Damgard, I.B., van de Graaf, J.: Multiparty Computation Ensuring Privacy of Each Party’s Input and Correctness of the Result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 86–119. Springer, Heidelberg (1987)Google Scholar
  3. [CD98]
    Camenisch, J., Damgard, I.: Verifiable encryption and applications to group signatures and signatures sharing., Technical Report RS 98-32, Brics, Department of Computer Science, University of Aarhus (December 1998)Google Scholar
  4. [Ch87]
    Chaum, D.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127–141. Springer, Heidelberg (1987)Google Scholar
  5. [CK97]
    Cox, I.J., Kilian, J., Leighton, T., Shamnon, T.: Secure spread spectrum watermarking for image, audio and video. IEEE Transactions on Image Processing 6(12), 1673–1678 (1997)CrossRefGoogle Scholar
  6. [GM82]
    Goldwasser, S., Micali, S.: Probabilistic Encryption and How to play Mental Poker Keeping Secret All Partial Information. In: Proceedings of the 14th STOC, pp. 365–377 (1982)Google Scholar
  7. [JK02]
    Ju, H.-S., Kim, H.-J., Lee, D.-H., Lim, J.-I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. [KT98]
    Killian, J., Leighton, F.T., Matheson, L.R., Shannon, T.G., Tarjan, R.E., Zane, F.: Resistance of Digital Watermarks to Collusive attacke (1998)Google Scholar
  9. [Ne83]
    Wanger, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy (1983)Google Scholar
  10. [MW01]
    Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Transactions on image processing 10(4), 643–649 (2001)MATHCrossRefGoogle Scholar
  11. [PS00]
    Pfitzman, B., Sadeghi, A.-R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–164. Springer, Heidelberg (1999)Google Scholar
  12. [PS96]
    Pfitzman, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)Google Scholar
  13. [PW97]
    Pfitzman, B., Waidner, W.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)Google Scholar
  14. [QN98]
    Qian, L., Nahrstedit, K.: Watermarking schemes and protocols for protecting rightfuk ownership and customer’s rights. J.Visual Commun. Image Represent 9, 194–210 (1998)CrossRefGoogle Scholar
  15. [ZV03]
    Zhao, W., Varadharajan, V., Mu, Y.: A secure Mental Poker Protocol Over the internet. In: Australasian Information Security Workshop 2003. Conference in Research and Practice in Information Technology, vol. 21(4) (February 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Jae-Gwi Choi
    • 1
  • Kouichi Sakurai
    • 2
  • Ji-Hwan Park
    • 1
  1. 1.Department of Information SecurityPukyong National Univ.BusanKorea
  2. 2.Faculty of Information Science and Electrical EngineeringKyushu Univ.FukuokaJapan

Personalised recommendations