A Tree Based Buyer-Seller Watermarking Protocol
To restrict the unauthorized duplication and distribution of multimedia contents, a content owner (seller) may insert a unique digital watermark into each copy of the multimedia contents before it is sold to a buyer. Some time later, the seller can trace the unlawful reseller (original buyer) by extracting and checking the watermark embedded, if an illegal replica is found in the market. However, the accusation against the seller cannot be overruled as he also has access to the watermarked copies. This paper proposes a new efficient watermarking protocol which is based on tree model and public key encryption standard. Buyer places the purchase order to sales point which will be forwarded to the certification authority via the dealer. The trusted certification authority issues the watermarked image in such a way that the buyer can check its originality. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller. This gives highest privilege to the user to ensure the quality of the purchased digital content.
KeywordsWatermark Image Multimedia Content Watermark Scheme Digital Content Certification Authority
Unable to display preview. Download preview PDF.
- N. Memon and P W Wong, “Protecting Digital Media Contents,” Commun. ACM, Vol 41, No. 7, pp. 35-43, July 1998Google Scholar
- G Voyatzis, N Nikolaidis, and I. Pitas, “Digital Watermarking: An Overview,” in Proc. 9$th$ European Signal Processing Conf., Sept. 1998, pp. 9-12Google Scholar
- S Katzenbeisser, “On the Design of Copyright Protection Protocols for Multimedia Distribution using Symmetric and Public key Watermarking,” in Proc. 12$th$ Int. workshop on Database and Expert System Application, Sept. 2001, pp. 815-819Google Scholar
- N Memon and P W Wong, “A Buyer-Seller Watermarking Protocol,” IEEE Trans. on Image Processing, Vol. 10, pp. 643-649, Apr. 2001Google Scholar
- K Gopalakrishnan, N. Memon, and PL Vora, “Protocols for Watermark Verification,” IEEE Multimedia, Vol. 8, pp. 66-70, Oct-Dec. 2001Google Scholar
- J J Eggers and B Girod, “Quantization Watermarking,” in Proc. of SPIE, Vol. 3971: Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, 2000Google Scholar
- Goi B-M, Phon R C-W, Yang Y, Bao F, Deng R H, and Siddiqi M U, “Cryptanalysis of two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for true Anonymity,” in Proc. Applied Cryptography and Network Security, 2004, LNCS 3089, pp. 369-382Google Scholar
- J Zhang, W Kou and K Fan, “Secure Buyer-Seller Watermarking Protocol,” IEEE Proc. Int. Conf. Security, Vol. 153, No. 1, March 2006Google Scholar
- R RIvest, A Shamir and L Adelman, “A Method for Obtaining Digital Signature and Public key Crypto System,” Commun. ACM, Vol. 21, pp. 120-126, 120-1978.Google Scholar
- L Qiao and K Nahrstedlt, “Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Right,” Journal of Visual Communication and Image Representation, Vol. 9, pp. 194-210, Sept. 1998Google Scholar
- F Hartung and M Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE Vol. 87, pp. 1079-1107, July 1999Google Scholar
- S Craver, “Zero Knowledge Watermark Detection," in Proc. 3$rd$ Int. workshop on Information Hiding, Vol. 1768, LNCS, Sep. 1999, pp. 101-116Google Scholar