Skip to main content
Log in

Proxy signatures and buyer–seller watermarking protocols for the protection of multimedia content

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Watermarking techniques are developed to deal with multimedia distribution, authentication and copyright protection. It is usually the seller who embeds a watermark in multimedia content to identify the buyer. The embedded watermark can then be used to trace the traitors identity if unauthorized copies are found. However, repudiation and framing issues might arise in this approach. To solve these problems, buyer–seller watermarking protocols have been proposed based on watermarking in the encrypted domain. Such watermarks combine encryption, digital watermarking, and fingerprinting to preserve digital rights of both the buyer and the seller. Unfortunately, most existing watermarking techniques do not provide convincing proofs to ensure that they achieve the claimed level of security and informal proofs abound in the literature. In this paper, we propose a buyer–seller watermarking protocol based on proxy signatures and homomorphic encryption. Formal proofs are provided to show that in the proposed protocol, watermarks are generated such that the seller is unable to fabricate piracy, but he can trace copyright violators. The protocol further protects anonymity of the buyer until he is adjudicated to be guilty. Moreover, we solve the conspiracy problem without imposing any unrealistic assumptions about thrust-worthiness of the parties involved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. Journal of Information Hiding and Multimedia Signal Processing 4(1):9–18

    Google Scholar 

  2. Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. In: Advances in cryptology–CRYPTO–95. Lecture notes in computer science, vol 963. Springer, Heidelberg, pp 452–465

  3. Chang CC, Tsai HC, Hsieh YP (2010) An efficient and fair buyer–seller fingerprinting scheme for large scale networks, computers & security, vol 29, pp 269–277

  4. Choi JHPJG, Sakurai K (2003) Does it need trusted third party? design of buyer–seller watermarking protocol without trusted third party. In: Applied cryptography and network security. LNCS 2846, pp 265–279

  5. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  6. Deng M, Preneel B (2008) On secure and anonymous buyer–seller watermarking protocol. In: IEEE conference on internet and web applications and services

  7. Eslami Z, Kazemnasabhaji M (2011) An efficient buyer–seller watermarking protocol based on proxy signatures. In: 8th international isc conference information security and cryptology (ISCISC), pp 73–78

  8. Fan CI, Ming TC, Sun WZ (2007) Buyer–seller watermarking protocols with off-line trusted parties. In: IEEE conference on multimedia and ubiquitous engineering

  9. Goi BM, Phan RCW, Yong Y, Bao F, Deng RH, Siddiqi MU (2004) Cryptanalysis of two anonymous buyer–seller watermarking protocols and an improvement for true anonymity. In: Applied cryptography and network security, pp 369–382

  10. Hu X, Huang S (2007) A novel proxy key generation protocol and its application. Comput Stand Interfaces 29:191–195

    Article  Google Scholar 

  11. Huang X, Mu Y, Susili W, Zhang F (2005) A short proxy signature scheme: efficient authentication in the ubiquitous world. In: Proc. of EUC workshops. LNCS, vol 3823, Springer-Verlag, pp 480–489

  12. Hwang M, Tzeng S, Tsai C (2004) Generalization of proxy signature based on elliptic curves. Comput Stand Interfaces 26:73–84

    Article  Google Scholar 

  13. Ju HS, Kim HJ, Lee DH, Lim JI (2002) An anonymous buyer–seller watermarking protocol with anonymity control. In: Information security and cryptology - ICISC, pp 421–432

  14. Jurik IDM (2001) A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: 4th international workshop on practice and theory in public-key cryptography, pp 119–136

  15. Katzenbeisser S, Lemma A, Celik MU, van der Veen M, Maas M (2008) A buyer–seller watermarking protocol based on secure embedding. IEEE T Inf Foren Sec 3(4):783–786

    Article  Google Scholar 

  16. Kim S, Park S, Won D (1997) Proxy signature, revisited. In: Proc. of ICICS’97, int. conf. information and communications security, vol 1334. Springer-Verlag, pp 223–232

  17. Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. J Digit Signal Process 21(4):522–527

    Article  Google Scholar 

  18. Lee B, Kim H, Won K (2001) Secure mobile agent using strong non-designated proxy signature. In: Proc. of ACISP. LNCS, vol 2119. Springer-Verlag, pp 474–486

  19. Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer–seller watermarking protocol. IEEE Trans Image Process 13(12):1618–1626

    Article  Google Scholar 

  20. Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimed Tools Appl 57(1):49–66

    Article  Google Scholar 

  21. Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

    Article  Google Scholar 

  22. Lin W-h, Horng S-j, Kao T-w, Chen R-j, Chen Y-h (2009) Image copyright protection with forward error correction. Expert Syst Appl 36(9):11888–11894

    Article  Google Scholar 

  23. Khaled L (2012) On the security of digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing 3(2):135–141

    MathSciNet  Google Scholar 

  24. Mambo M, Usuda K, Okamoto E (1996) Proxy signature: delegation of the power to sign messages. IEICE Trans Fundam E79-A(9):1338–1354

  25. Meerwald P, Koidl C, Uhl A (2009) Attack on “watermarking method based on significant difference of wavelet coefficient quantization”. IEEE Trans Multimed 11(5):1037–1041

    Article  Google Scholar 

  26. Memon N, Wong PW (2001) A buyer–seller watermarking protocol. IEEE Trans Image Process 10(4):643–649

    Article  MATH  Google Scholar 

  27. Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Proc. Eurocrypt 99. LNCS 1592, pp 223–238

  28. Poon TH, Miri A, Zhao J (2009) An improved watermarking technique for multi-user, multi-right environments. Multimed Tools Appl 42(2):161–181

    Article  Google Scholar 

  29. Raphael CWP, Goi BM, Poh GS, Kim J (2011) Analysis of a buyer—seller watermarking protocol for trustworthy purchasing. Wirel Pers Commun 56(1):73–83

    Article  Google Scholar 

  30. Rosenberg B (2010) Handbook of financial cryptography and security. A Champon and Hall book. CRC Press, pp 427–428

  31. Schaathun HG (2008) On error-correcting fingerprinting codes for use with watermarking. Multimed Syst 13:331–344

    Article  Google Scholar 

  32. Shao MH (2007) A privacy-preserving buyer–seller watermarking protocol with semi-trust third party. In: Trust, privacy and security in digital business. LNCS 4657, pp 44–53

  33. Stinson DR (1995) Cryptography: theory and practice, 1st edn. Chapman & Hall, New York

    MATH  Google Scholar 

  34. Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimed 14(3):703–716

    Article  Google Scholar 

  35. Wang Y-R (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 38(7):8024–8029

    Article  Google Scholar 

  36. Yu Y, Xu C, Huang X, Mub Y (2009) An efficient anonymous proxy signature scheme with provable security. Comput Stand Interfaces 31:348–353

    Article  Google Scholar 

  37. Zhang J, Kou W, Fan K (2006) Secure buyer–seller watermarking protocol. IEE Proc Inf Secur 153(1):15–18

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ziba Eslami.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Eslami, Z., Kazemnasabhaji, M. & Mirehi, N. Proxy signatures and buyer–seller watermarking protocols for the protection of multimedia content. Multimed Tools Appl 72, 2723–2740 (2014). https://doi.org/10.1007/s11042-013-1555-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1555-0

Keywords

Navigation