Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Watermarking protocols: an excursus to motivate a new approach

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Digital watermarking is one of the techniques that can be used to support digital copyright protection. It enables copyright owners to insert a perceptually invisible watermark within any copy of content that is distributed on the Internet. The main aim is to use watermarks to implement copyright identification and content tracking. However, digital watermarking is not sufficient to ensure an adequate copyright protection, if it is not employed in conjunction with watermarking protocols, which define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Therefore, watermarking protocols play a central role in the field of digital copyright protection by means of watermarking techniques. They have to ensure both a correct content protection and an easy participation of buyers in the purchase transactions of the contents distributed on the Internet. This paper presents a new watermarking protocol based on an innovative, buyer centric, and mediated design approach. The result is a secure protocol that enables buyers to easily participate in the transactions by which they can buy digital protected content, and this makes the protocol suited for the current web context.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)

    Google Scholar 

  2. Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005)

    Book  Google Scholar 

  3. Pehlivanoglu, S.: An asymmetric fingerprinting code for collusion-resistant buyer–seller watermarking. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, ACM, New York, NY, USA, 17–19 June 2013, pp. 35–44

  4. Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimed. 8(4), 66–70 (2001)

    Article  Google Scholar 

  5. Kuribayashy, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)

    Article  Google Scholar 

  6. Frattolillo, F.: Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2(3), 350–363 (2007)

    Article  Google Scholar 

  7. Frattolillo, F.: Watermarking protocols: problems, challenges and a possible solution. Comput. J. 58(4), 944–960 (2015)

    Article  Google Scholar 

  8. Memon, N., Wong, P.W.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)

    Article  MATH  Google Scholar 

  9. Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)

    Article  Google Scholar 

  10. Fan, C.I., Chen, M.T., Sun, W.Z.: Buyer–seller watermarking protocols with off-line trusted parties. In: Proceedings of the IEEE Internationla Conference on Multimedia and Ubiquitous Engineering, Seul, South Korea, IEEE Computer Society, Washington, DC, USA, 26–28 April 2007, pp. 1035–1040

  11. Das, V.V.: Buyer–seller watermarking protocol for an anonymous network transaction. In: Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, IEEE Computer Society, Washington, DC, USA, 16–18 July 2008, pp. 807–812

  12. Laxmi, V., Khan, M.N., Sarath, S., Gaur, M.S.: Buyer–seller watermarking protocol for digital rights management. In: Proceedings of the 2nd International Conference on Security of information and networks, Famagusta, North Cyprus, ACM, New York, NY, USA, 6–10 Oct 2009, pp. 298–301

  13. Hu, D., Li, Q.: A secure and practical buyer–seller watermarking protocol. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, IEEE Computer Society, Washington, DC, USA, 18–20 Nov 2009, pp. 105–108

  14. Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)

    Article  Google Scholar 

  15. Rial, A., Balasch, J., Preneel, B.: A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 6(1), 202–212 (2011)

    Article  Google Scholar 

  16. Xu, Z., Li, L., Gao, H.: Bandwidth efficient buyer–seller watermarking protocol. Int. J. Inf. Comput. Secur. 5(1), 1–10 (2012)

    Google Scholar 

  17. Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)

    Article  Google Scholar 

  18. Bianchi, T., Piva, A., Shullani, D.: Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6 (2015)

    Article  Google Scholar 

  19. Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)

    Article  Google Scholar 

  20. Zhao, H.V., Liu, K.J.R.: Traitor-within-traitor behavior forensics: strategy and risk minimization. IEEE Trans. Inf. Forensics Secur. 1(4), 440–456 (2006)

    Article  Google Scholar 

  21. Frattolillo, F.: A buyer-friendly and mediated watermarking protocol for web context. ACM Trans. Web 10(2), 9 (2016)

    Article  Google Scholar 

  22. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, Springer, Berlin, German, 5–8 June 2007, pp. 288–306

  23. Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In Cramer, R., ed.: Proc. 11th Int. Work. on Practice and Theory in Public-Key Cryptography. Volume 4939 of Lecture Notes in Computer Science., Barcelona, Spain, Springer, Berlin Heidelberg, German (March, 9–12 2008) 360–379

  24. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE Conference on Information communications, San Diego, CA, USA, IEEE Computer Society, Washington, DC, USA, 14–19 Mar 2010, pp. 534–542

  25. Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, ACM, New York, NY, USA, 13–16 Apr 2010, pp. 261–270

  26. Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)

    Article  Google Scholar 

  27. Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications, Shanghai, China, IEEE Computer Society, Washington, DC, USA, 10–15 Apr 2011, pp. 1952–1960

  28. Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007)

  29. Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proc. Inf. Secur. 153(1), 15–18 (2006)

    Article  Google Scholar 

  30. Deng, M., Preneel, B.: Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In: Proceedings of the IEEE International Symposium on Electronic Commerce and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 3–5 Aug 2008, pp. 923–929

  31. Hu, Y., Zhang, J.: A secure and efficient buyer–seller watermarking protocol. J. Multimed. 4(3), 161–168 (2009)

    Google Scholar 

  32. Katzenbeisser, S., Lemma, A., Celik, M.U., van der Veen, M., Maas, M.: A buyer–seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)

    Article  Google Scholar 

  33. Lemma, A.N., Katzenbeisser, S., Celik, M.U., v. d. Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds) Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 4283, Jeju Island, Korea, Springer, Berlin, Germany, 8–10 Nov 2006, pp. 433–445

  34. Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)

    Article  Google Scholar 

  35. Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Lecture Notes in Computer Science, vol. 2045, Innsbruck, Austria, Springer, Berlin Heidelberg, German, 6–10 May 2001, pp. 119–135

  36. Wen, Q., Wang, Y.: Improvement of the digital watermarking protocol based on the zero-watermark method. In: Proceedings of the 3rd Annual Summit and Conference of Asia Pacific Signal and Information Processing Association, Xi’an, China, PSIPA publisher, 19–21 Oct 2011

  37. Cox, I., Kilian, J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Signal Process. 6(12), 1673–1687 (1997)

    Google Scholar 

  38. Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete algorithms, Washington, DC, USA, 7–9 Jan 2001, pp. 448–457

  39. Terelius, B.: Towards transferable watermarks in buyer–seller watermarking protocols. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 18–21 Nov 2013, pp. 197–202

  40. Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, ACM, New York, NY, USA, 9–11 June 2003, pp. 116–125

  41. Huang, J.C., Jeng, F.G., Chen, T.H.: A new buyer–seller watermarking protocol without multiple watermarks insertion. Multimed. Tools Appl. 75(33), 1–13 (2016)

    Google Scholar 

  42. Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Eurocrypt ‘94. Lecture Notes in Computer Science, vol. 950, Perugia, Italy, Springer, Berlin, Heidelberg, May 1995, pp. 1–12

  43. Deng, M., Preneel, B.: On secure and anonymous buyer–seller watermarking protocol. In: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 8–13 June 2008, pp. 524–529

  44. Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, ACM, New York, NY, USA, 7–8 Sept 2009, pp. 9–18

  45. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  46. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, The USENIX Association, 13–17 Aug 2001, pp. 297–308

  47. Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated RSA. In: Joye, M. (ed.) The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, vol. 2612 , San Francisco, CA, USA, Springer, Berlin, Germany, 13–17 Apr 2003, pp. 193–210

  48. Poh, G.S., Martin, K.M.: Classification framework for fair content tracing protocols. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5703, Guildford, UK, Springer, Berlin, Germany, 24–26 Aug 2009, pp. 252–267

  49. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999)

  50. Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 9(9), 194–210 (1998)

    Article  Google Scholar 

  51. Rannenberg, K., Royer, D., Deuker, A.: The Future of Identity in the Information Society—Challenges and Opportunities. Springer, Berlin (2009)

    Book  Google Scholar 

  52. Williams, D.M., Treharne, H., Ho, A.T.S.: On the importance of one-time key pairs in buyer–seller watermarking protocols. In: Proceedings of the International Conference on Security and Cryptography, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 26–28 July 2010, pp. 441–446

  53. Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, vol. 740, Santa Barbara, CA, USA, Springer, Berlin, Germany, 16–20 Aug 1992, pp. 390–420

  54. Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH, Zurich, Switzerland (March 1997)

  55. Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1992, Cheju Island, Korea, Springer, Berlin, Germany, 13–15 Feb 2001, pp. 119–136

  56. Canetti, R.: Security and composition of cryptographic protocols: a tutorial. Cryptology ePrint Archive, Report 2006/465 (2006)

  57. Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents, Proceedings of the SPIE, vol. 3657, San Jose, CA, USA, SPIE, Bellingham WA, USA, 9 Apr 1999, pp. 147–158

  58. Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, Proceedings of the SPIE, vol. 4675 S. Jose, CA, USA, SPIE, Bellingham WA, USA, 29 Apr 2002, pp. 260–268

  59. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)

    Article  Google Scholar 

  60. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Eurocrypt ‘99. Lecture Notes in Computer Science, vol. 1592, Prague, Czech Republic, Springer, Berlin, Heidelberg, 2–6 May 1999, pp. 223–238

  61. Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, vol. 4004, Saint Petersburg, Russia, Springer, Berlin, Germany, 28 May–1 June 2006, pp. 409–426

  62. Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A.: Formal analysis of two buyer–seller watermarking protocols. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5450, Busan, Korea, Springer, Berlin, Germany, 10–12 Nov 2008, pp. 278–292

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Franco Frattolillo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Frattolillo, F. Watermarking protocols: an excursus to motivate a new approach. Int. J. Inf. Secur. 17, 587–601 (2018). https://doi.org/10.1007/s10207-017-0386-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-017-0386-9

Keywords