Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2482513.2482525acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking

Published: 17 June 2013 Publication History

Abstract

A buyer seller watermarking protocol is intended to ensure copyright protection, privacy and security for both the buyer and seller simultaneously in an e-commerce application. A traitor should not be able to deny his responsibility of a copyright violation caused by him in such protocols. This feature is identified as non-repudiation in the literature. An efficient approach taken is through secure embedding of watermarks in an encrypted domain by using dither modulation and homomorphic encryption. To support non-repudiation along with collusion resistance, one needs an asymmetric collusion resistant fingerprinting code that is compatible with the watermarking technique. The design of such codes has not yet studied thoroughly with an exception of a recent work by Charpentier et. al. in [4].
In this paper, we propose an asymmetric binary fingerprinting code based on Boneh-Shaw code. When applied to the secure embedding of watermarks, we show that our code outperforms the code introduced by [4]: (i) we achieve constant communication round, (ii) we do not require any oblivious transfer protocol and (iii) we do not require any public Write Once Read Many (WORM) directory.

References

[1]
I. Biehl, B. Meyer: Protocols for Collusion-Secure Asymmetric Fingerprinting STACS 1997: 399-412.
[2]
D. Boneh and M. Naor: Traitor tracing with constant size ciphertext. In proceedings of the 15th ACM conference on Computer and Communications Security (CCS '08), pp. 501--510, 2008.
[3]
D. Boneh, J. Shaw: Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). CRYPTO 1995
[4]
A. Charpentier, C. Fontaine, T. Furon, I. J. Cox: An Asymmetric Fingerprinting Scheme based on Tardos Codes. Information Hiding 2011: 43--58.
[5]
B. Chor, A. Fiat, M. Naor: Tracing Traitors. CRYPTO 1994: 257--270.
[6]
S. Craver, N. Memon, B. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573--586, May 1998.
[7]
M. Deng, T. Bianchi, A. Piva and B. Preneel: An Efficient Buyer-Seller Watermarking Protocol based on composite signal representation. 11th ACM Workshop on Multimedia and Security, Princeton, NJ, 2009, pp. 9--18.
[8]
M. Deng, L. Weng, B. Preneel: Anonymous Buyer-Seller Watermarking Protocol with Additive Homomorphism. SIGMAP 2008: 300--307.
[9]
Ju, H. S., Kim, H. J., Lee, D. H., and Lim, J. I. (2002). An anonymous buyer-seller watermarking protocol with anonymity control. Information security and cryptology ICISC 2002.
[10]
H. Jin, J. Lotspiech: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. ESORICS 2007: 563--577.
[11]
A. Kiayias, S. Pehlivanoglu: Tracing and Revoking Pirate Rebroadcasts. ACNS 2009: 253--271.
[12]
A. Kiayias and S. Pehlivanoglu. Encryption for Digital Content, volume 52 of Advances in Information Security. Springer, 2010.
[13]
A. Kiayias, S. Pehlivanoglu: Improving the Round Complexity of Traitor Tracing Schemes. ACNS 2010.
[14]
M. Kuribayashi, H. Tanaka: Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing 14(12), 2005.
[15]
A. Kiayias and M. Yung, On Crafty Pirates and Foxy Tracers, ACM CCS-8 Workshop DRM 2001.
[16]
N. D. Memon, P. W. Wong: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10(4): 643--649 (2001).
[17]
J. P. Prins, Z. Erkin, R. L. Lagendijk: Anonymous Fingerprinting with Robust QIM Watermarking Techniques. EURASIP J. Information Security 2007.
[18]
B. Pfitzmann, M. Schunter: Asymmetric Fingerprinting. EUROCRYPT 1996: 84--95.
[19]
B. Pfitzmann, M. Waidner: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communications Security 1997
[20]
B. Pfitzmann, M. Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88--102
[21]
Min-Hua Shao. A privacy-preserving buyer-seller watermarking protocol with semi- trust third party. In Trust, Privacy and Security in Digital Business, 2007
[22]
J. Staddon, D. R. Stinson, R. Wei: Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory 47(3) 2001
[23]
D. R. Stinson, R. Wei: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM J. Discrete Math. 11(1): 41--53 (1998)
[24]
R. Safavi-Naini, Y. Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029--3033 (2001)
[25]
Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing 14(6), 2005
[26]
Gabor Tardos: Optimal probabilistic fingerprint codes. J. ACM 55(2): (2008)
[27]
J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. IEE Proceedings Information Security, 153(1):15--18, March 2006.

Cited By

View all
  • (2024) Homomorphic encryption domain asymmetric fingerprinting scheme for 3D models of oblique photography Transactions in GIS10.1111/tgis.1316028:4(790-815)Online publication date: 22-Mar-2024
  • (2024)Asymmetric fingerprinting protocol for vector map based on homomorphic encryptionJournal of Spatial Science10.1080/14498596.2024.236276469:4(1131-1150)Online publication date: 6-Jun-2024
  • (2020)A Watermarking Protocol Based on BlockchainApplied Sciences10.3390/app1021774610:21(7746)Online publication date: 2-Nov-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
June 2013
242 pages
ISBN:9781450320818
DOI:10.1145/2482513
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. asymmetric fingerprinting
  2. buyer-seller watermarking
  3. non-repudiation

Qualifiers

  • Research-article

Conference

IH&MMSec '13
Sponsor:

Acceptance Rates

IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024) Homomorphic encryption domain asymmetric fingerprinting scheme for 3D models of oblique photography Transactions in GIS10.1111/tgis.1316028:4(790-815)Online publication date: 22-Mar-2024
  • (2024)Asymmetric fingerprinting protocol for vector map based on homomorphic encryptionJournal of Spatial Science10.1080/14498596.2024.236276469:4(1131-1150)Online publication date: 6-Jun-2024
  • (2020)A Watermarking Protocol Based on BlockchainApplied Sciences10.3390/app1021774610:21(7746)Online publication date: 2-Nov-2020
  • (2019)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus NetworkComputer Security – ESORICS 201910.1007/978-3-030-29959-0_12(234-256)Online publication date: 15-Sep-2019
  • (2018)Watermarking protocolsInternational Journal of Information Security10.1007/s10207-017-0386-917:5(587-601)Online publication date: 1-Oct-2018
  • (2016)Buyer seller watermarking protocols issues and challenges A surveyJournal of Network and Computer Applications10.1016/j.jnca.2016.08.02675:C(317-334)Online publication date: 1-Nov-2016
  • (2016)PSUMJournal of Network and Computer Applications10.1016/j.jnca.2016.03.00766:C(180-197)Online publication date: 1-May-2016
  • (2015)Anticollusion solutions for asymmetric fingerprinting protocols based on client side embeddingEURASIP Journal on Information Security10.1186/s13635-015-0023-y2015:1Online publication date: 28-Aug-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media