Advertisement

An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption

  • Geong Sen Poh
  • Keith M. Martin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5450)

Abstract

Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distributor to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant gains in computational and operational efficiency.

Keywords

Encryption Scheme Watermark Scheme Homomorphic Encryption Digital Signature Scheme User Table 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 136–147. Springer, Heidelberg (2006); Also, Technical Report detailing the ACISP 2006 paperCrossRefGoogle Scholar
  2. 2.
    Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)Google Scholar
  3. 3.
    Choi, J.-G., Sakurai, K., Park, J.-H.: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265–279. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  5. 5.
    Deng, M., Preneel, B.: On Secure and Anonymous Buyer-Seller Watermarking Protocol. In: 2008 International Conference on Internet and Web Applications and Services. IEEE Computer Society Press, Los Alamitos (2008)Google Scholar
  6. 6.
    Dierks, T., Rescorla, E.: The TLS Protocol Version 1.1. In: RFC 4346 (2006)Google Scholar
  7. 7.
    Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 369–382. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An Effective and Secure Buyer-Seller Watermarking Protocol. In: Third International Symposium on Information Assurance and Security (IAS 2007), pp. 21–26. IEEE Computer Society Press, Los Alamitos (2007)CrossRefGoogle Scholar
  9. 9.
    Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Katzenbeisser, S., Skorić, B., Celik, M.U., Sadeghi, A.-R.: Combining Tardos Fingerprinting Codes and Fingercasting. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 294–310. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98, Princeton University, Department of Computer Science (1988), ftp://ftp.cs.princeton.edu/techreports/1998/585.ps.gz
  12. 12.
    RSA Labs. RSA Signature Scheme with Appendix - Probabilistic Signature Scheme (2000), ftp://ftp.rsasecurity.com/pub/rsalabs/rsa_algorithm/nessie_pss.zip
  13. 13.
    Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing 13(12), 1618–1626 (2004)CrossRefGoogle Scholar
  14. 14.
    Ray Liu, K.J., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communication, vol. 4. Hindawi Publishing Corporation (2005)Google Scholar
  15. 15.
    Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)CrossRefzbMATHGoogle Scholar
  16. 16.
    Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  17. 17.
    Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  18. 18.
    Pfitzmann, B., Sadeghi, A.-R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–164. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  19. 19.
    Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  20. 20.
    Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  21. 21.
    Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer’s rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Geong Sen Poh
    • 1
  • Keith M. Martin
    • 1
  1. 1.Information Security Group,Royal HollowayUniversity of LondonEghamUnited Kingdom

Personalised recommendations