Abstract
Watermarking protocols are used in conjunction with digital watermarking techniques to protect digital copyright on the Internet. They define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Over the last few years, significant examples of watermarking protocols have been proposed in literature. However, a detailed examination of such protocols has revealed a number of problems that have to be addressed in order to make them suited for current web context. Therefore, based on the most relevant problems derived from literature, this article identifies the main challenges posed by the development of watermarking protocols for web context and presents a watermarking protocol that follows a new secure, buyer-centric and mediated design approach able to meet such challenges.
- M. Barni and F. Bartolini. 2004. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, Boca Raton, FL. Google ScholarDigital Library
- M. Bellare and O. Goldreich. 1992. On defining proofs of knowledge. In Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.), Vol. 740. Springer, Berlin, 390--420. Google ScholarDigital Library
- M. Bellare and P. Rogaway. 2006. The security of triple encryption and a framework for code-based game-playing proofs. In Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, S. Vaudenay (Ed.), Vol. 4004. Springer-Verlag, Berlin, Germany, Saint Petersburg, Russia, 409--426. Google ScholarDigital Library
- M. Bellare, H. Shi, and C. Zhang. 2005. Foundations of group signatures: The case of dynamic groups. In CT-RSA (Lecture Notes in Computer Science), A. Menezes (Ed.), Vol. 3376. Springer, Berlin, 136--153. Google ScholarDigital Library
- T. Bianchi and A. Piva. 2013. Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30, 2, 87--96.Google ScholarCross Ref
- D. Boneh, X. Ding, G. Tsudik, and C. M. Wong. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308. Google ScholarDigital Library
- M. Campidoglio, F. Frattolillo, and F. Landolfi. 2009. The copyright protection problem: Challenges and suggestions. In Proceedings of the 4th International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Venice, Italy, 522--526. Google ScholarDigital Library
- R. Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE International Symposium on Foundations of Computer Science. IEEE Computer Society, Washington, DC, Las Vegas, NV, 136--145. Google ScholarDigital Library
- R. Canetti. 2006. Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive, Report 2006/465. Google ScholarDigital Library
- M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. 2008. Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security 3, 3, 475--487. Google ScholarDigital Library
- C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh. 2010. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers and Security 29, 2, 269--277. Google ScholarDigital Library
- B. Chen and G. Wornell. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 4,, 1423--1443. Google ScholarDigital Library
- I. Cox, J. Bloom, and M. Miller. 2001. Digital Watermarking: Principles & Practice. Morgan Kaufman, Burlington, MA.Google Scholar
- I. Damgård and M. Jurik. 2001. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.), Vol. 1992. Springer, Berlin, 119--136. Google ScholarDigital Library
- V. V. Das. 2008. Buyer-seller watermarking protocol for an anonymous network transaction. In Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology. IEEE Computer Society, Washington, DC, Nagpur, Maharashtra, India, 807--812. Google ScholarDigital Library
- M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2009. An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM, New York, NY, Princeton, NJ, 9--18. Google ScholarDigital Library
- M. Deng and B. Preneel. 2008a. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society, Washington, DC, Guangzhou, China, 923--929. Google ScholarDigital Library
- M. Deng and B. Preneel. 2008b. On secure and anonymous buyer-seller watermarking protocol. In Proceedings of the 3rd International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Athens, Greece, 524--529. Google ScholarDigital Library
- X. Ding and G. Tsudik. 2003. Simple identity-based cryptography with mediated RSA. In The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, M. Joye (Ed.), Vol. 2612. Springer, Berlin, 193--210. Google ScholarDigital Library
- C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. 1999. SPKI certificate theory. RFC 2693. Google ScholarDigital Library
- C. I. Fan, M. T. Chen, and W. Z. Sun. 2007. Buyer-seller watermarking protocols with off-line trusted parties. In Proceedings of the IEEE International Conference on Multimedia and Ubiquitous Engineering. IEEE Computer Society, Washington, DC, Seoul, South Korea, 1035--1040. Google ScholarDigital Library
- C. Fontaine and F. Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007, Article 13801, 10 pages. DOI:http://dx.doi.org/10.1155/2007/13801Google Scholar
- F. Frattolillo. 2007. Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security 2, 3, 350--363. Google ScholarDigital Library
- F. Frattolillo. 2015. Watermarking protocols: Problems, challenges and a possible solution. Computer Journal 58, 4, 944--960.Google ScholarCross Ref
- F. Frattolillo and S. D’Onofrio. 2005. Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform. In Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.), Vol. 44. Australian Computer Society, Sydney, Australia, Newcastle, Australia, 159--167. Google ScholarDigital Library
- F. Frattolillo and F. Landolfi. 2008. Designing a DRM system. In Proceedings of the 4th International Conference on Information Assurance and Security. IEEE Computer Society, Washington, DC, Naples, Italy, 221--226. Google ScholarDigital Library
- F. Frattolillo and F. Landolfi. 2010. A cluster grids based platform for digital copyright protection. In Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society, Washington, DC, Timisoara, Romania, 83--87.Google Scholar
- F. Frattolillo, F. Landolfi, and F. Marulli. 2009. A novel approach to DRM systems. In Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society, Washington, DC, Vancouver, Canada, 492--497. Google ScholarDigital Library
- K. Gopalakrishnan, N. Memon, and P. L. Vora. 2001. Protocols for watermark verification. IEEE Multimedia 8, 4, 66--70. Google ScholarDigital Library
- M. Green and G. Ateniese. 2007. Identity-based proxy re-encryption. In Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Springer, Berlin, 288--306. Google ScholarDigital Library
- F. Hartung, J. K. Su, and B. Girod. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 3657. SPIE, Bellingham WA, San Jose, CA, 147--158.Google Scholar
- D. Hu and Q. Li. 2009. A secure and practical buyer-seller watermarking protocol. In Proceedings of the International Conference on Multimedia Information Networking and Security. IEEE Computer Society, Washington, DC, Wuhan, China, 105--108. Google ScholarDigital Library
- Y. Hu and J. Zhang. 2009. A secure and efficient buyer-seller watermarking protocol. Journal of Multimedia 4, 3, 161--168.Google ScholarCross Ref
- I. M. Ibrahim, S. H. N. El-Din, and A. F. A. Hegazy. 2007. An effective and secure buyer-seller watermarking protocol. In Proceedings of the 3rd International Symposium on Information Assurance and Security. IEEE Computer Society, Washington, DC, Manchester, United Kingdom, 21--28. Google ScholarDigital Library
- S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. 2008. A buyer-seller watermarking protocol based on secure embedding. IEEE Transactions on Information Forensics and Security 3, 4, 783--786. Google ScholarDigital Library
- S. Katzenbeisser and H. Veith. 2002. Securing symmetric watermarking schemes against protocol attacks. In Security and Watermarking of Multimedia Contents IV (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 4675. SPIE, Bellingham WA, San Jose, CA, 260--268.Google Scholar
- W. Ku and C.-H. Chi. 2004. Survey on the technological aspects of digital rights management. In Proceedings of the 7th International Information Security Conference. Lecture Notes in Computer Science, K. Zhang and Y. Zheng (Eds.), Vol. 3225. Springer, Berlin, 391--403.Google Scholar
- M. Kuribayashy and H. Tanaka. 2005. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing 14, 12, 2129--2139. Google ScholarDigital Library
- V. Laxmi, M. N. Khan, S. Sarath, and M. S. Gaur. 2009. Buyer seller watermarking protocol for digital rights management. In Proceedings of the 2nd International Conference on Security of Information and Networks. ACM, New York, NY, Famagusta, North Cyprus, 298--301. Google ScholarDigital Library
- S.-H. Lee, S.-G. Kwon, and K.-R. Kwon. 2014. Mobile 3d secure transmission based on anonymous buyer-seller watermarking protocol. Recent Advances in Communications and Networking Technology 3, 1, 33--43.Google ScholarCross Ref
- C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan. 2004. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13, 12, 1618--1626. Google ScholarDigital Library
- A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. v. d. Veen. 2006. Secure watermark embedding through partial encryption. In Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, Y.-Q. Shi and B. Jeon (Eds.), Vol. 4283. Springer, Berlin, 433--445. Google ScholarDigital Library
- E. Liu, Z. Liu, and F. Shao. 2014. Digital rights management and access control in multimedia social networks. In Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.), Vol. 238. Springer, Berlin, 257--266.Google Scholar
- K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York, NY.Google Scholar
- N. Memon and P. W. Wong. 2001. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10, 4, 643--649. Google ScholarDigital Library
- P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt ’99. Lecture Notes in Computer Science, Vol. 1592. Springer, Berlin, 223--238. Google ScholarDigital Library
- F. A. P. Petitcolas. 2000. Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 5, 58--64.Google ScholarCross Ref
- F. A. P. Petitcolas and others. 2001. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In Electronic Imaging 2001, Security and Watermarking of Multimedia Contents (January 22--26, 2001) (Proceedings of SPIE), P. W. Wong and E. J. Delp (Eds.), Vol. 4314. SPIE, Bellingham WA, San Jose, CA, 575--584.Google Scholar
- G. S. Poh. 2009. Design and Analysis of Fair Content Tracing Protocols. Ph.D. Dissertation. Department of Mathematics, Royal Holloway, University of London, Egham, Surrey, UK.Google Scholar
- G. S. Poh and K. M. Martin. 2009. Classification framework for fair content tracing protocols. In Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, A. T. S. Ho, Y. Q. Shi, H. J. Kim, and M. Barni (Eds.), Vol. 5703. Springer, Berlin, 252--267. Google ScholarDigital Library
- J. P. Prins, Z. Erkin, and R. L. Lagendijk. 2007. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007, Article 31340, 13 pages. DOI:http://dx.doi.org/10.1155/2007/31340Google Scholar
- L. Qiao and K. Nahrstedt. 1998. Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9, 9, 194--210. Google ScholarDigital Library
- K. Rannenberg. 2000. Multilateral security. A concept and examples for balanced security. In Proceedings of the 9th ACM Workshop on New Security Paradigms. ACM, New York, NY, Cork, Ireland, 151--162. Google ScholarDigital Library
- K. Rannenberg, D. Royer, and A. Deuker. 2009. The Future of Identity in the Information Society - Challenges and Opportunities. Springer, Berlin. Google ScholarDigital Library
- A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2010. A provably secure anonymous buyer-seller watermarking protocol. IEEE Transactions on Information Forensics and Security 5, 4, 920--931. Google ScholarDigital Library
- W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu. 2003. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 41, 4, 1069--1087. Google ScholarDigital Library
- G. Wang, Q. Liu, J. Wu, and M. Guo. 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 30, 5, 320--331. Google ScholarDigital Library
- D. M. Williams, H. Treharne, and A. T. S. Ho. 2010. On the importance of one-time key pairs in buyer-seller watermarking protocols. In ProcInternational Conference on Security and Cryptography. IEEE Computer Society, Washington, DC, Athens, Greece, 441--446.Google Scholar
- D. M. Williams, H. Treharne, A. T. S. Ho, and A. Waller. 2008. Formal analysis of two buyer-seller watermarking protocols. In Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, H. J. Kim, S. Katzenbeisser, and A. T. S. Ho (Eds.), Vol. 5450. Springer, Berlin, 278--292. Google ScholarDigital Library
- M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu. 2004. Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21, 2, 15--27.Google ScholarCross Ref
- S. Wu and Q. Pu. 2012. Comments on a buyer-seller watermarking protocol for large scale networks. International Journal of Network Security 14, 1, 53--58.Google Scholar
- F. W. C. Yang and X. Wang. 2007. Efficient mediated certificates public-key encryption scheme without pairings. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE Computer Society, Washington, DC, Niagara Falls, Ontario, Canada, 109--112. Google ScholarDigital Library
- S. Yu, C. Wang, K. Ren, and W. Lou. 2010a. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society, Washington, DC, San Diego, CA, 534--542. Google ScholarDigital Library
- S. Yu, C. Wang, K. Ren, and W. Lou. 2010b. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, New York, NY, Beijing, China, 261--270. Google ScholarDigital Library
- J. Zhang, W. Kou, and K. Fan. 2006. Secure buyer-seller watermarking protocol. IEEE Proceedings on Information Security 153, 1, 15--18.Google ScholarCross Ref
- J. Zhang, Y. Xiang, W. Zhou, L. Ye, and Y. Mu. 2011. Secure image retrieval based on visual content and watermarking protocol. Computer Journal 54, 10, 1661--1674. Google ScholarDigital Library
- Z. Zhang, Q. Pei, J. Ma, and L. Yang. 2009. Security and trust in digital rights management: A survey. International Journal of Network Security 9, 3, 247--263.Google Scholar
- H. V. Zhao and K. J. R. Liu. 2006. Traitor-within-traitor behavior forensics: Strategy and risk minimization. IEEE Transactions on Information Forensics and Security 1, 4, 440--456. Google ScholarDigital Library
Index Terms
- A Buyer-Friendly and Mediated Watermarking Protocol for Web Context
Recommendations
Buyer-seller watermarking protocols with off-line trusted third parties
In a buyer-seller watermarking protocol, buyers and sellers protect the ownerships or copyrights of their digital contents through the watermarks embedded in them. However, some known attacks and problems are still threatening the security of the ...
Watermarking Protocol for Web Context
Part 1Digital watermarking is considered to be a main technology for the copyright protection of multimedia digital content distributed on the Internet. However, watermarking procedures can effectively support copyright protection processes only if they are ...
A Secure and Practical Buyer-Seller Watermarking Protocol
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 02A buyer-seller watermarking protocol can enable a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. To this end, many buyer-seller watermarking protocols have been proposed. In the ...
Comments