Advertisement

Formal Analysis of Two Buyer-Seller Watermarking Protocols

  • David M. Williams
  • Helen Treharne
  • Anthony T. S. Ho
  • Adrian Waller
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5450)

Abstract

In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

Keywords

Deductive System Digital Watermark Communicate Sequential Process Protocol Model Cryptographic Primitive 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Williams, D.M., Treharne, H., Ho, A.T.S., Culnane, C.: Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocolGoogle Scholar
  2. 2.
    Memon, N., Wong, P.W.: A buyer seller watermarking protocol. IEEE Transactions on Image Processing 10(4), 643–649 (2001)CrossRefzbMATHGoogle Scholar
  3. 3.
    Poh, G.S., Martin, K.M.: A framework for design and analysis of asymmetric fingerprinting protocols. In: Third International Symposium on Information Assurance and Security, pp. 457–461 (2007)Google Scholar
  4. 4.
    Shao, M.H.: A privacy-preserving buyer-seller watermarking protocol with semi-trust third partyGoogle Scholar
  5. 5.
    Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13(12), 1618–1626 (2004)CrossRefGoogle Scholar
  6. 6.
    Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)CrossRefGoogle Scholar
  7. 7.
    Roscoe, A.W., Ryan, P., Schneider, S., Goldsmith, M., Lowe, G.: The Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)Google Scholar
  8. 8.
    Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An effective and secure buyer seller watermarking protocol. In: Third International Symposium on Information Assurance and Security, pp. 21–28 (2007)Google Scholar
  9. 9.
    Hoare, C.A.R.: Communicating sequential processes. Prentice-Hall International, Englewood Cliffs (1985)zbMATHGoogle Scholar
  10. 10.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  11. 11.
    Cox, I.J., Miller, L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
  12. 12.
    Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile (1999)Google Scholar
  13. 13.
    Formal Systems. FDR 2.82. Formal Systems Ltd. (2005)Google Scholar
  14. 14.
    Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice Hall, Englewood Cliffs (1998)Google Scholar
  15. 15.
    Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. In: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pp. 147–166 (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • David M. Williams
    • 1
  • Helen Treharne
    • 1
  • Anthony T. S. Ho
    • 1
  • Adrian Waller
    • 2
  1. 1.University of SurreyGuildfordUK
  2. 2.Thales Research and Technology (UK) Ltd.ReadingUK

Personalised recommendations