Skip to main content

An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

Abstract

Anonymity is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. Unfortunately, most watermarking protocols in the literature have been developed without considering a buyer’s anonymity. It would be unsatisfactory for the buyer to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous buyer-seller watermarking protocol, where a buyer can purchase contents anonymously, but anonymity control is provided, i.e., a seller can trace the identity of a copyright violator. The proposed scheme also provides unlinkability of contents purchased by a buyer. Another distinct feature of our scheme is that the identification of an illegal buyer is accomplished in a way such that the seller can directly convince a judge that the buyer has redistributed contents. This feature removes any possibility of dispute. Furthermore, when the innocent buyer is falsely accused by a malicious seller, it is possible to prove his/her innocence without attending a court and revealing any privacy.

This work was supported by grant No.R 01-2001-000-00537-0 (2002) from the Korea Science & Engineering Foundation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, V. Shoup, and M. Waidner, Optimistic fair exchange of digital signatures, IEEE Journal on selected Areas in communications, 18(4), pp.591–610, Apr.2000. 423, 426

    Article  Google Scholar 

  2. F. Bao, An Efficient Verifiable Encryption scheme for Encryption of Discrete Logarithms, CARDIS’98, vol.1820 of LNCS2000. 423, 426

    Google Scholar 

  3. S. Brands Untraceable Off-line Cash in Wallets with Observers Advances In Cryptology: Proc of CRYPTO’93, pp.302–318, 1994. 423

    Google Scholar 

  4. G. R. Blakley, C. Meadows, G.B. Purdy Fingerprinting Long Forgiving Messages, Crypto’85, LNCS 218, Springer-Verlag, Berlin 1986, 180–189. 421, 423

    Google Scholar 

  5. D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, Crypto’95, LNCS 963, pp. 452–465, Springer-Verlag, Berlin, 1995. 421, 422, 423

    Google Scholar 

  6. J. Camenisch and I. Damgard, Verifiable encryption and applications to group signatures and signatures sharing, Technical Report RS 98-32, Brics, Department of Computer Science, University of Aarhus, Dec.1998. 423, 426

    Google Scholar 

  7. D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash Advances in Cryptology-CRYPTO’88, pp.319–327,1990. 423

    Google Scholar 

  8. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for images, audio and video, IEEE Trans.on Image Processing, vol.6, no.12, pp.1673–1678, 1997. 421, 422

    Article  Google Scholar 

  9. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, Can Invisible Watermarks Resolve Rightful Ownership?, IBM research Report, RC 20509, July 25, 1996. 421

    Google Scholar 

  10. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, Resolving Rightful Ownership with invisible Watermarking Techniques: Limitations, Attacks and implications, Technical report, IBM Research Report RC 20755, March1997.

    Google Scholar 

  11. S. Craver, Zero Knowledge Watermark Detection, Proceedings of the Third International workship on Information Hiding, Springer Lecture Notes in Computer Science, vol.1768, pp.101–116, 2000.

    Google Scholar 

  12. Joe Killian, F. Thomson Leighton, Lesley R. Matheson, Talal G. Shamoon, Robert E. Tarjan, and Francis Zane, Resistance of Digital Watermarks to Collusive Attacks, Proceedings of the IEEE International Symposium on Information Theory, 1998. 422

    Google Scholar 

  13. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. Pseudonym systems http://theory.lcs.mit.edu/ anna/lrsw99.ps, 1999. 423

  14. N. Memon and P. W. Wong, A Buyer-Seller Watermarking Protocol based on amplitude Modulation and the ElGamal Public Key Cryptosystem, Proceedings of SPIE99, vol3657. 426

    Google Scholar 

  15. N. Memon and P. W. Wong, A Buyer-Seller Watermarking Protocol, IEEE Transactions on image processing, vol.10, no.4, April 2001. 422, 423, 426, 428, 430

    Google Scholar 

  16. B. Pfitzmann and M. Schunter, Asymmetric Fingerprinting, Eurocrypt’96, LNCS 1070, pp.84–95, Springer-Verlag, Berlin 1996. 422, 423, 428

    Google Scholar 

  17. B. Pfitzmann and M. Waidner, Anonymous Fingerprinting, Eurocrypt’97, LNCS 1233, Spring-Verlag, Berlin 1997, 88–102422, 423, 428

    Google Scholar 

  18. B. Pfitzmann and Ahmad-Reza Sadeghi, Coin-Based Anonymous Fingerprinting, Eurocrypt’99, LNCS 1592, Spring-Verlag, Berlin 1996, 150–164. 422, 423

    Google Scholar 

  19. G. Poupard and J. Stern, Fair Encryption of RSA Keys, Enrocrypt2000, LNCS, pp.173–190, Springer-Verlag, 2000. 423, 426

    Google Scholar 

  20. L. Qian and K. Nahrstedt, Watermarking Schemes and Protocols for Protection Rightful Ownership and Customer’s Rights, Academic Press Journal of Visual Communication and Image Representation, 1998. 422, 423

    Google Scholar 

  21. M. Ramkumar and A. N. Akansu, Image Watermarks and Counterfeit Attacks: Some Problems and Solutions, Content Security and Data Hiding in Digital Media, Newark, NJ, May 14, 1999. 421

    Google Scholar 

  22. M. Stadler, Public verifiable secret sharing, Eurocrypt’96, LNCS 1070, pp.191-199, Springer Verlag, 1996. 423, 426

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Soo Ju, H., Jeong Kim, H., Hoon Lee, D., In Lim, J. (2003). An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics