Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A Buyer-Friendly and Mediated Watermarking Protocol for Web Context

Published: 29 April 2016 Publication History

Abstract

Watermarking protocols are used in conjunction with digital watermarking techniques to protect digital copyright on the Internet. They define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Over the last few years, significant examples of watermarking protocols have been proposed in literature. However, a detailed examination of such protocols has revealed a number of problems that have to be addressed in order to make them suited for current web context. Therefore, based on the most relevant problems derived from literature, this article identifies the main challenges posed by the development of watermarking protocols for web context and presents a watermarking protocol that follows a new secure, buyer-centric and mediated design approach able to meet such challenges.

References

[1]
M. Barni and F. Bartolini. 2004. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, Boca Raton, FL.
[2]
M. Bellare and O. Goldreich. 1992. On defining proofs of knowledge. In Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.), Vol. 740. Springer, Berlin, 390--420.
[3]
M. Bellare and P. Rogaway. 2006. The security of triple encryption and a framework for code-based game-playing proofs. In Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, S. Vaudenay (Ed.), Vol. 4004. Springer-Verlag, Berlin, Germany, Saint Petersburg, Russia, 409--426.
[4]
M. Bellare, H. Shi, and C. Zhang. 2005. Foundations of group signatures: The case of dynamic groups. In CT-RSA (Lecture Notes in Computer Science), A. Menezes (Ed.), Vol. 3376. Springer, Berlin, 136--153.
[5]
T. Bianchi and A. Piva. 2013. Secure watermarking for multimedia content protection: A review of its benefits and open issues. IEEE Signal Processing Magazine 30, 2, 87--96.
[6]
D. Boneh, X. Ding, G. Tsudik, and C. M. Wong. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308.
[7]
M. Campidoglio, F. Frattolillo, and F. Landolfi. 2009. The copyright protection problem: Challenges and suggestions. In Proceedings of the 4th International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Venice, Italy, 522--526.
[8]
R. Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE International Symposium on Foundations of Computer Science. IEEE Computer Society, Washington, DC, Las Vegas, NV, 136--145.
[9]
R. Canetti. 2006. Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive, Report 2006/465.
[10]
M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. 2008. Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security 3, 3, 475--487.
[11]
C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh. 2010. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers and Security 29, 2, 269--277.
[12]
B. Chen and G. Wornell. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 4, 1423--1443.
[13]
I. Cox, J. Bloom, and M. Miller. 2001. Digital Watermarking: Principles & Practice. Morgan Kaufman, Burlington, MA.
[14]
I. Damgård and M. Jurik. 2001. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.), Vol. 1992. Springer, Berlin, 119--136.
[15]
V. V. Das. 2008. Buyer-seller watermarking protocol for an anonymous network transaction. In Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology. IEEE Computer Society, Washington, DC, Nagpur, Maharashtra, India, 807--812.
[16]
M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2009. An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM, New York, NY, Princeton, NJ, 9--18.
[17]
M. Deng and B. Preneel. 2008a. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society, Washington, DC, Guangzhou, China, 923--929.
[18]
M. Deng and B. Preneel. 2008b. On secure and anonymous buyer-seller watermarking protocol. In Proceedings of the 3rd International Conference on Internet and Web Applications and Services. IEEE Computer Society, Washington, DC, Athens, Greece, 524--529.
[19]
X. Ding and G. Tsudik. 2003. Simple identity-based cryptography with mediated RSA. In The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, M. Joye (Ed.), Vol. 2612. Springer, Berlin, 193--210.
[20]
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. 1999. SPKI certificate theory. RFC 2693.
[21]
C. I. Fan, M. T. Chen, and W. Z. Sun. 2007. Buyer-seller watermarking protocols with off-line trusted parties. In Proceedings of the IEEE International Conference on Multimedia and Ubiquitous Engineering. IEEE Computer Society, Washington, DC, Seoul, South Korea, 1035--1040.
[22]
C. Fontaine and F. Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007, Article 13801, 10 pages.
[23]
F. Frattolillo. 2007. Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security 2, 3, 350--363.
[24]
F. Frattolillo. 2015. Watermarking protocols: Problems, challenges and a possible solution. Computer Journal 58, 4, 944--960.
[25]
F. Frattolillo and S. D’Onofrio. 2005. Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform. In Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.), Vol. 44. Australian Computer Society, Sydney, Australia, Newcastle, Australia, 159--167.
[26]
F. Frattolillo and F. Landolfi. 2008. Designing a DRM system. In Proceedings of the 4th International Conference on Information Assurance and Security. IEEE Computer Society, Washington, DC, Naples, Italy, 221--226.
[27]
F. Frattolillo and F. Landolfi. 2010. A cluster grids based platform for digital copyright protection. In Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society, Washington, DC, Timisoara, Romania, 83--87.
[28]
F. Frattolillo, F. Landolfi, and F. Marulli. 2009. A novel approach to DRM systems. In Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society, Washington, DC, Vancouver, Canada, 492--497.
[29]
K. Gopalakrishnan, N. Memon, and P. L. Vora. 2001. Protocols for watermark verification. IEEE Multimedia 8, 4, 66--70.
[30]
M. Green and G. Ateniese. 2007. Identity-based proxy re-encryption. In Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Springer, Berlin, 288--306.
[31]
F. Hartung, J. K. Su, and B. Girod. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 3657. SPIE, Bellingham WA, San Jose, CA, 147--158.
[32]
D. Hu and Q. Li. 2009. A secure and practical buyer-seller watermarking protocol. In Proceedings of the International Conference on Multimedia Information Networking and Security. IEEE Computer Society, Washington, DC, Wuhan, China, 105--108.
[33]
Y. Hu and J. Zhang. 2009. A secure and efficient buyer-seller watermarking protocol. Journal of Multimedia 4, 3, 161--168.
[34]
I. M. Ibrahim, S. H. N. El-Din, and A. F. A. Hegazy. 2007. An effective and secure buyer-seller watermarking protocol. In Proceedings of the 3rd International Symposium on Information Assurance and Security. IEEE Computer Society, Washington, DC, Manchester, United Kingdom, 21--28.
[35]
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. 2008. A buyer-seller watermarking protocol based on secure embedding. IEEE Transactions on Information Forensics and Security 3, 4, 783--786.
[36]
S. Katzenbeisser and H. Veith. 2002. Securing symmetric watermarking schemes against protocol attacks. In Security and Watermarking of Multimedia Contents IV (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 4675. SPIE, Bellingham WA, San Jose, CA, 260--268.
[37]
W. Ku and C.-H. Chi. 2004. Survey on the technological aspects of digital rights management. In Proceedings of the 7th International Information Security Conference. Lecture Notes in Computer Science, K. Zhang and Y. Zheng (Eds.), Vol. 3225. Springer, Berlin, 391--403.
[38]
M. Kuribayashy and H. Tanaka. 2005. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing 14, 12, 2129--2139.
[39]
V. Laxmi, M. N. Khan, S. Sarath, and M. S. Gaur. 2009. Buyer seller watermarking protocol for digital rights management. In Proceedings of the 2nd International Conference on Security of Information and Networks. ACM, New York, NY, Famagusta, North Cyprus, 298--301.
[40]
S.-H. Lee, S.-G. Kwon, and K.-R. Kwon. 2014. Mobile 3d secure transmission based on anonymous buyer-seller watermarking protocol. Recent Advances in Communications and Networking Technology 3, 1, 33--43.
[41]
C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan. 2004. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13, 12, 1618--1626.
[42]
A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. v. d. Veen. 2006. Secure watermark embedding through partial encryption. In Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, Y.-Q. Shi and B. Jeon (Eds.), Vol. 4283. Springer, Berlin, 433--445.
[43]
E. Liu, Z. Liu, and F. Shao. 2014. Digital rights management and access control in multimedia social networks. In Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.), Vol. 238. Springer, Berlin, 257--266.
[44]
K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York, NY.
[45]
N. Memon and P. W. Wong. 2001. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10, 4, 643--649.
[46]
P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt ’99. Lecture Notes in Computer Science, Vol. 1592. Springer, Berlin, 223--238.
[47]
F. A. P. Petitcolas. 2000. Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 5, 58--64.
[48]
F. A. P. Petitcolas and others. 2001. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In Electronic Imaging 2001, Security and Watermarking of Multimedia Contents (January 22--26, 2001) (Proceedings of SPIE), P. W. Wong and E. J. Delp (Eds.), Vol. 4314. SPIE, Bellingham WA, San Jose, CA, 575--584.
[49]
G. S. Poh. 2009. Design and Analysis of Fair Content Tracing Protocols. Ph.D. Dissertation. Department of Mathematics, Royal Holloway, University of London, Egham, Surrey, UK.
[50]
G. S. Poh and K. M. Martin. 2009. Classification framework for fair content tracing protocols. In Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, A. T. S. Ho, Y. Q. Shi, H. J. Kim, and M. Barni (Eds.), Vol. 5703. Springer, Berlin, 252--267.
[51]
J. P. Prins, Z. Erkin, and R. L. Lagendijk. 2007. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007, Article 31340, 13 pages.
[52]
L. Qiao and K. Nahrstedt. 1998. Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9, 9, 194--210.
[53]
K. Rannenberg. 2000. Multilateral security. A concept and examples for balanced security. In Proceedings of the 9th ACM Workshop on New Security Paradigms. ACM, New York, NY, Cork, Ireland, 151--162.
[54]
K. Rannenberg, D. Royer, and A. Deuker. 2009. The Future of Identity in the Information Society - Challenges and Opportunities. Springer, Berlin.
[55]
A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel. 2010. A provably secure anonymous buyer-seller watermarking protocol. IEEE Transactions on Information Forensics and Security 5, 4, 920--931.
[56]
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu. 2003. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 41, 4, 1069--1087.
[57]
G. Wang, Q. Liu, J. Wu, and M. Guo. 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 30, 5, 320--331.
[58]
D. M. Williams, H. Treharne, and A. T. S. Ho. 2010. On the importance of one-time key pairs in buyer-seller watermarking protocols. In ProcInternational Conference on Security and Cryptography. IEEE Computer Society, Washington, DC, Athens, Greece, 441--446.
[59]
D. M. Williams, H. Treharne, A. T. S. Ho, and A. Waller. 2008. Formal analysis of two buyer-seller watermarking protocols. In Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, H. J. Kim, S. Katzenbeisser, and A. T. S. Ho (Eds.), Vol. 5450. Springer, Berlin, 278--292.
[60]
M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu. 2004. Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21, 2, 15--27.
[61]
S. Wu and Q. Pu. 2012. Comments on a buyer-seller watermarking protocol for large scale networks. International Journal of Network Security 14, 1, 53--58.
[62]
F. W. C. Yang and X. Wang. 2007. Efficient mediated certificates public-key encryption scheme without pairings. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE Computer Society, Washington, DC, Niagara Falls, Ontario, Canada, 109--112.
[63]
S. Yu, C. Wang, K. Ren, and W. Lou. 2010a. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society, Washington, DC, San Diego, CA, 534--542.
[64]
S. Yu, C. Wang, K. Ren, and W. Lou. 2010b. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, New York, NY, Beijing, China, 261--270.
[65]
J. Zhang, W. Kou, and K. Fan. 2006. Secure buyer-seller watermarking protocol. IEEE Proceedings on Information Security 153, 1, 15--18.
[66]
J. Zhang, Y. Xiang, W. Zhou, L. Ye, and Y. Mu. 2011. Secure image retrieval based on visual content and watermarking protocol. Computer Journal 54, 10, 1661--1674.
[67]
Z. Zhang, Q. Pei, J. Ma, and L. Yang. 2009. Security and trust in digital rights management: A survey. International Journal of Network Security 9, 3, 247--263.
[68]
H. V. Zhao and K. J. R. Liu. 2006. Traitor-within-traitor behavior forensics: Strategy and risk minimization. IEEE Transactions on Information Forensics and Security 1, 4, 440--456.

Cited By

View all
  • (2024)FairCMS: Cloud Media Sharing With Fair Copyright ProtectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.337445211:5(6192-6209)Online publication date: Oct-2024
  • (2024)A fair and scalable watermarking scheme for the digital content trading industryComputers in Industry10.1016/j.compind.2024.104125161(104125)Online publication date: Oct-2024
  • (2024)Multiparty watermarking protocol based on blockchainMultimedia Tools and Applications10.1007/s11042-023-15691-583:1(367-379)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on the Web
ACM Transactions on the Web  Volume 10, Issue 2
May 2016
214 pages
ISSN:1559-1131
EISSN:1559-114X
DOI:10.1145/2932204
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 April 2016
Accepted: 01 December 2015
Revised: 01 September 2015
Received: 01 March 2015
Published in TWEB Volume 10, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Watermarking protocols
  2. digital copyright protection

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)FairCMS: Cloud Media Sharing With Fair Copyright ProtectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.337445211:5(6192-6209)Online publication date: Oct-2024
  • (2024)A fair and scalable watermarking scheme for the digital content trading industryComputers in Industry10.1016/j.compind.2024.104125161(104125)Online publication date: Oct-2024
  • (2024)Multiparty watermarking protocol based on blockchainMultimedia Tools and Applications10.1007/s11042-023-15691-583:1(367-379)Online publication date: 1-Jan-2024
  • (2022)Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive HomomorphismSymmetry10.3390/sym1411244114:11(2441)Online publication date: 17-Nov-2022
  • (2022)A TTP watermarking protocol based on visual cryptographyMultimedia Tools and Applications10.1007/s11042-022-13002-y81:28(41079-41101)Online publication date: 1-Nov-2022
  • (2022)A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preservingMultimedia Tools and Applications10.1007/s11042-022-12550-781:15(21417-21448)Online publication date: 15-Mar-2022
  • (2021)Blockchain and Cloud to Overcome the Problems of Buyer and Seller Watermarking ProtocolsApplied Sciences10.3390/app11241202811:24(12028)Online publication date: 17-Dec-2021
  • (2020)A Watermarking Protocol Based on BlockchainApplied Sciences10.3390/app1021774610:21(7746)Online publication date: 2-Nov-2020
  • (2020)A Blockchain Based Buyer-seller Watermark Protocol with Trustless Third PartyRecent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)10.2174/235209651399920062312121313:6(942-950)Online publication date: 4-Nov-2020
  • (2019)A multiparty watermarking protocol for cloud environmentsJournal of Information Security and Applications10.1016/j.jisa.2019.05.01147(246-257)Online publication date: Aug-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media