skip to main content
research-article

A Buyer-Friendly and Mediated Watermarking Protocol for Web Context

Published:29 April 2016Publication History
Skip Abstract Section

Abstract

Watermarking protocols are used in conjunction with digital watermarking techniques to protect digital copyright on the Internet. They define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Over the last few years, significant examples of watermarking protocols have been proposed in literature. However, a detailed examination of such protocols has revealed a number of problems that have to be addressed in order to make them suited for current web context. Therefore, based on the most relevant problems derived from literature, this article identifies the main challenges posed by the development of watermarking protocols for web context and presents a watermarking protocol that follows a new secure, buyer-centric and mediated design approach able to meet such challenges.

References

  1. M. Barni and F. Bartolini. 2004. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, Boca Raton, FL. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Bellare and O. Goldreich. 1992. On defining proofs of knowledge. In Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.), Vol. 740. Springer, Berlin, 390--420. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Bellare and P. Rogaway. 2006. The security of triple encryption and a framework for code-based game-playing proofs. In Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, S. Vaudenay (Ed.), Vol. 4004. Springer-Verlag, Berlin, Germany, Saint Petersburg, Russia, 409--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bellare, H. Shi, and C. Zhang. 2005. Foundations of group signatures: The case of dynamic groups. In CT-RSA (Lecture Notes in Computer Science), A. Menezes (Ed.), Vol. 3376. Springer, Berlin, 136--153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Bianchi and A. Piva. 2013. Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30, 2, 87--96.Google ScholarGoogle ScholarCross RefCross Ref
  6. D. Boneh, X. Ding, G. Tsudik, and C. M. Wong. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Campidoglio, F. Frattolillo, and F. Landolfi. 2009. The copyright protection problem: Challenges and suggestions. In Proceedings of the 4th International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Venice, Italy, 522--526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE International Symposium on Foundations of Computer Science. IEEE Computer Society, Washington, DC, Las Vegas, NV, 136--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Canetti. 2006. Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive, Report 2006/465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. 2008. Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security 3, 3, 475--487. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh. 2010. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers and Security 29, 2, 269--277. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Chen and G. Wornell. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 4,, 1423--1443. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. Cox, J. Bloom, and M. Miller. 2001. Digital Watermarking: Principles & Practice. Morgan Kaufman, Burlington, MA.Google ScholarGoogle Scholar
  14. I. Damgård and M. Jurik. 2001. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.), Vol. 1992. Springer, Berlin, 119--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. V. Das. 2008. Buyer-seller watermarking protocol for an anonymous network transaction. In Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology. IEEE Computer Society, Washington, DC, Nagpur, Maharashtra, India, 807--812. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2009. An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM, New York, NY, Princeton, NJ, 9--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Deng and B. Preneel. 2008a. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society, Washington, DC, Guangzhou, China, 923--929. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Deng and B. Preneel. 2008b. On secure and anonymous buyer-seller watermarking protocol. In Proceedings of the 3rd International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Athens, Greece, 524--529. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Ding and G. Tsudik. 2003. Simple identity-based cryptography with mediated RSA. In The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, M. Joye (Ed.), Vol. 2612. Springer, Berlin, 193--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. 1999. SPKI certificate theory. RFC 2693. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. I. Fan, M. T. Chen, and W. Z. Sun. 2007. Buyer-seller watermarking protocols with off-line trusted parties. In Proceedings of the IEEE International Conference on Multimedia and Ubiquitous Engineering. IEEE Computer Society, Washington, DC, Seoul, South Korea, 1035--1040. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Fontaine and F. Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007, Article 13801, 10 pages. DOI:http://dx.doi.org/10.1155/2007/13801Google ScholarGoogle Scholar
  23. F. Frattolillo. 2007. Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security 2, 3, 350--363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. F. Frattolillo. 2015. Watermarking protocols: Problems, challenges and a possible solution. Computer Journal 58, 4, 944--960.Google ScholarGoogle ScholarCross RefCross Ref
  25. F. Frattolillo and S. D’Onofrio. 2005. Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform. In Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.), Vol. 44. Australian Computer Society, Sydney, Australia, Newcastle, Australia, 159--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F. Frattolillo and F. Landolfi. 2008. Designing a DRM system. In Proceedings of the 4th International Conference on Information Assurance and Security. IEEE Computer Society, Washington, DC, Naples, Italy, 221--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. F. Frattolillo and F. Landolfi. 2010. A cluster grids based platform for digital copyright protection. In Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society, Washington, DC, Timisoara, Romania, 83--87.Google ScholarGoogle Scholar
  28. F. Frattolillo, F. Landolfi, and F. Marulli. 2009. A novel approach to DRM systems. In Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society, Washington, DC, Vancouver, Canada, 492--497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. K. Gopalakrishnan, N. Memon, and P. L. Vora. 2001. Protocols for watermark verification. IEEE Multimedia 8, 4, 66--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Green and G. Ateniese. 2007. Identity-based proxy re-encryption. In Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Springer, Berlin, 288--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. F. Hartung, J. K. Su, and B. Girod. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 3657. SPIE, Bellingham WA, San Jose, CA, 147--158.Google ScholarGoogle Scholar
  32. D. Hu and Q. Li. 2009. A secure and practical buyer-seller watermarking protocol. In Proceedings of the International Conference on Multimedia Information Networking and Security. IEEE Computer Society, Washington, DC, Wuhan, China, 105--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Hu and J. Zhang. 2009. A secure and efficient buyer-seller watermarking protocol. Journal of Multimedia 4, 3, 161--168.Google ScholarGoogle ScholarCross RefCross Ref
  34. I. M. Ibrahim, S. H. N. El-Din, and A. F. A. Hegazy. 2007. An effective and secure buyer-seller watermarking protocol. In Proceedings of the 3rd International Symposium on Information Assurance and Security. IEEE Computer Society, Washington, DC, Manchester, United Kingdom, 21--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. 2008. A buyer-seller watermarking protocol based on secure embedding. IEEE Transactions on Information Forensics and Security 3, 4, 783--786. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Katzenbeisser and H. Veith. 2002. Securing symmetric watermarking schemes against protocol attacks. In Security and Watermarking of Multimedia Contents IV (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 4675. SPIE, Bellingham WA, San Jose, CA, 260--268.Google ScholarGoogle Scholar
  37. W. Ku and C.-H. Chi. 2004. Survey on the technological aspects of digital rights management. In Proceedings of the 7th International Information Security Conference. Lecture Notes in Computer Science, K. Zhang and Y. Zheng (Eds.), Vol. 3225. Springer, Berlin, 391--403.Google ScholarGoogle Scholar
  38. M. Kuribayashy and H. Tanaka. 2005. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing 14, 12, 2129--2139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. V. Laxmi, M. N. Khan, S. Sarath, and M. S. Gaur. 2009. Buyer seller watermarking protocol for digital rights management. In Proceedings of the 2nd International Conference on Security of Information and Networks. ACM, New York, NY, Famagusta, North Cyprus, 298--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. S.-H. Lee, S.-G. Kwon, and K.-R. Kwon. 2014. Mobile 3d secure transmission based on anonymous buyer-seller watermarking protocol. Recent Advances in Communications and Networking Technology 3, 1, 33--43.Google ScholarGoogle ScholarCross RefCross Ref
  41. C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan. 2004. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13, 12, 1618--1626. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. v. d. Veen. 2006. Secure watermark embedding through partial encryption. In Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, Y.-Q. Shi and B. Jeon (Eds.), Vol. 4283. Springer, Berlin, 433--445. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. E. Liu, Z. Liu, and F. Shao. 2014. Digital rights management and access control in multimedia social networks. In Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.), Vol. 238. Springer, Berlin, 257--266.Google ScholarGoogle Scholar
  44. K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York, NY.Google ScholarGoogle Scholar
  45. N. Memon and P. W. Wong. 2001. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10, 4, 643--649. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt ’99. Lecture Notes in Computer Science, Vol. 1592. Springer, Berlin, 223--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. F. A. P. Petitcolas. 2000. Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 5, 58--64.Google ScholarGoogle ScholarCross RefCross Ref
  48. F. A. P. Petitcolas and others. 2001. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In Electronic Imaging 2001, Security and Watermarking of Multimedia Contents (January 22--26, 2001) (Proceedings of SPIE), P. W. Wong and E. J. Delp (Eds.), Vol. 4314. SPIE, Bellingham WA, San Jose, CA, 575--584.Google ScholarGoogle Scholar
  49. G. S. Poh. 2009. Design and Analysis of Fair Content Tracing Protocols. Ph.D. Dissertation. Department of Mathematics, Royal Holloway, University of London, Egham, Surrey, UK.Google ScholarGoogle Scholar
  50. G. S. Poh and K. M. Martin. 2009. Classification framework for fair content tracing protocols. In Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, A. T. S. Ho, Y. Q. Shi, H. J. Kim, and M. Barni (Eds.), Vol. 5703. Springer, Berlin, 252--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. J. P. Prins, Z. Erkin, and R. L. Lagendijk. 2007. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007, Article 31340, 13 pages. DOI:http://dx.doi.org/10.1155/2007/31340Google ScholarGoogle Scholar
  52. L. Qiao and K. Nahrstedt. 1998. Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9, 9, 194--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. K. Rannenberg. 2000. Multilateral security. A concept and examples for balanced security. In Proceedings of the 9th ACM Workshop on New Security Paradigms. ACM, New York, NY, Cork, Ireland, 151--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. K. Rannenberg, D. Royer, and A. Deuker. 2009. The Future of Identity in the Information Society - Challenges and Opportunities. Springer, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2010. A provably secure anonymous buyer-seller watermarking protocol. IEEE Transactions on Information Forensics and Security 5, 4, 920--931. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu. 2003. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 41, 4, 1069--1087. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. G. Wang, Q. Liu, J. Wu, and M. Guo. 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 30, 5, 320--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. D. M. Williams, H. Treharne, and A. T. S. Ho. 2010. On the importance of one-time key pairs in buyer-seller watermarking protocols. In ProcInternational Conference on Security and Cryptography. IEEE Computer Society, Washington, DC, Athens, Greece, 441--446.Google ScholarGoogle Scholar
  59. D. M. Williams, H. Treharne, A. T. S. Ho, and A. Waller. 2008. Formal analysis of two buyer-seller watermarking protocols. In Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, H. J. Kim, S. Katzenbeisser, and A. T. S. Ho (Eds.), Vol. 5450. Springer, Berlin, 278--292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu. 2004. Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21, 2, 15--27.Google ScholarGoogle ScholarCross RefCross Ref
  61. S. Wu and Q. Pu. 2012. Comments on a buyer-seller watermarking protocol for large scale networks. International Journal of Network Security 14, 1, 53--58.Google ScholarGoogle Scholar
  62. F. W. C. Yang and X. Wang. 2007. Efficient mediated certificates public-key encryption scheme without pairings. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE Computer Society, Washington, DC, Niagara Falls, Ontario, Canada, 109--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. S. Yu, C. Wang, K. Ren, and W. Lou. 2010a. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society, Washington, DC, San Diego, CA, 534--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. S. Yu, C. Wang, K. Ren, and W. Lou. 2010b. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, New York, NY, Beijing, China, 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. J. Zhang, W. Kou, and K. Fan. 2006. Secure buyer-seller watermarking protocol. IEEE Proceedings on Information Security 153, 1, 15--18.Google ScholarGoogle ScholarCross RefCross Ref
  66. J. Zhang, Y. Xiang, W. Zhou, L. Ye, and Y. Mu. 2011. Secure image retrieval based on visual content and watermarking protocol. Computer Journal 54, 10, 1661--1674. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Z. Zhang, Q. Pei, J. Ma, and L. Yang. 2009. Security and trust in digital rights management: A survey. International Journal of Network Security 9, 3, 247--263.Google ScholarGoogle Scholar
  68. H. V. Zhao and K. J. R. Liu. 2006. Traitor-within-traitor behavior forensics: Strategy and risk minimization. IEEE Transactions on Information Forensics and Security 1, 4, 440--456. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Buyer-Friendly and Mediated Watermarking Protocol for Web Context

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on the Web
          ACM Transactions on the Web  Volume 10, Issue 2
          May 2016
          214 pages
          ISSN:1559-1131
          EISSN:1559-114X
          DOI:10.1145/2932204
          Issue’s Table of Contents

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 April 2016
          • Accepted: 1 December 2015
          • Revised: 1 September 2015
          • Received: 1 March 2015
          Published in tweb Volume 10, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader