Abstract
The illegal copying and redistribution of digital content is a crucial problem to distributors who electronically sell digital content. Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. Anonymous fingerprinting scheme prevents the content provider from framing the buyer by making the fingerprinted version known to the buyer only. In designing a fingerprinting scheme, it is important to make it more practical and efficient.
In this paper, we proposed a fingerprinting protocol to address the problem using cryptographic technologies and watermarking scheme. The digital content is encrypted using symmetric encryption. And keys, which are used to decrypt encrypted digital content, are double locked by two encryption keys kept separately by the buyer and the content provider. In the protocol, the buyer only gets a few of keys and can decrypt a few of fingerprinted digital contents in a transaction and the content provider has no idea how the fingerprint is formed. This facilitates the authority to determine the unethical party in case of illegal distributions of digital contents.
This work was partially supported by Brain Korea 21 project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bao, F., Deng, R.H., Feng, P.: An efficient and practical scheme for privacy protection in the E-commerce of digital goods. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 162–170. Springer, Heidelberg (2003)
Blakley, G., Meadow, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Chang, C.C., Chung, C.Y.: An enhanced buyer-seller watermarking protocol. In: Proc. ICCT 2003, pp. 1779–1783 (2003)
Chaum, D.: An impoved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 127–141. Springer, Heidelberg (1988)
Chaum, D., Damagaard, I.B., vad de Graaf, J.: Multiparty computations ensuring privacy of each party’s input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87–119. Springer, Heidelberg (1988)
Cheung, S., Leung, H., Wang, C.: A commutative encrypted protocol for the privacy protection of watermarks in digital contents. In: HICSS 2004, p. 40094a (2004)
Choi, J.G., Sakurai, K., Park, J.H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265–279. Springer, Heidelberg (2003)
Choi, J.G., Park, J.H., Kwon, K.R.: Analysis of COT-based fingerprinting schemes: new approach to design practical and secure fingerprinting scheme. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 253–265. Springer, Heidelberg (2004)
Cox, I.J., Kilian, J., Leighton, T., Shamnon, T.: Secure spread spectrum watermarking for image, audio and video. IEEE Transactions on Image Processing 6(12), 1673–1678 (1997)
Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 43–52. Springer, Heidelberg (1999)
Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification redistributors. IEE Electronic Letters 43(13), 1303–1304 (1998)
Kuribayashi, M., Tanaka, H.: A new anonymous fingerprinting scheme with high enciphering rate. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 30–39. Springer, Heidelberg (2001)
Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10(4), 643–649 (2001)
Pfitzmann, B., Sadeghi, A.R.: Coin-based anonymous fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–164. Springer, Heidelberg (1999)
Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)
Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)
Trappe, W., Wu, M., Liu, K.: Collusion-resistant fingerprinting for multimedia. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, pp. 3309–3312 (2002)
Wanger, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 18–22 (1983)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yong, S., Lee, SH. (2005). An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_5
Download citation
DOI: https://doi.org/10.1007/11551492_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)