A Buyer-Seller Digital Watermarking Protocol without Third Party Authorization

Article Preview

Abstract:

For protecting copyright of digital work, a kind of digital work commerce protocol is proposed based on RSA public key system. Digital fingerprint information that embedded in digital work can only be generated by the cooperation of the publisher and the user. The publisher cannot obtain this digital work, but the publisher can judge whether the fingerprint information exists in illegal copied digital work. This protocol can be utilized to trace and accuse the illegal piracy. Meanwhile, it can also protect legal user from framed by publishers. The digital fingerprint identification procedure that dispenses with participation of the third party can effectively avoid forgery in the procedure, which makes the scheme more convenient and safer than the scheme that needs the third party.

You have full access to the following eBook

Info:

[1] A. Lu. A novel video watermarking scheme against manifold attacks. Journal of Image and Graphics, 14: 11(2009), 2205~2211.

Google Scholar

[2] C.L. Hou, C.C. Lu, S.C. Tsai, et al. An optimal data hiding scheme with tree-based parity check. IEEE Transactions on Image Processing, 20: 3(2011), 880-886.

DOI: 10.1109/tip.2010.2072513

Google Scholar

[3] S.H. Liu, L. Han, H.X. Yao. Video watermarking algorithm for resisting collusion attacks. Journal on Communications, 32: 1 (2009), 14-19.

Google Scholar

[4] L. Zhang, Q.L. Li, D.F. Hu. Scalable anti-collusion digital fingerprinting scheme. Computer Engineering and Applications, 48: 1(2012), 128-131.

Google Scholar

[5] X.Y. Wang, S. R. Douglas. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. IEEE Transactions on Dependable and Secure Computing, 8: 3(2011), 434-449.

DOI: 10.1109/tdsc.2010.35

Google Scholar

[6] Y. Zhu, Y.T. Yang, Z.Y. Ye. An asymmetric spread spectrum fingerprinting with buyer transparency [J]. ACTA ELECTRONICA SINICA, 34: 6(2006), 1041-1047.

Google Scholar

[7] D.F. Hu, Q.L. Li. Bandwidth efficient asymmetric fingerprinting scheme. International Journal of Communication Systems,  25: 2(2012), 84-91.

DOI: 10.1002/dac.1253

Google Scholar

[8] C.C. Chang, H.C. Tsai, Y.P. Hsieh. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers & Security , 29: 2(2010), 269-277.

DOI: 10.1016/j.cose.2009.08.008

Google Scholar

[9] Z. J. Deng, X. J. Lai, D. K. He. Digital rights management model to resell right. Computer Engineering, 2009, 35(20): 20-22.

Google Scholar

[10] X.S. Chen, L.G. Liu, Z.D. Lu. Design and Analysis of Digital Image Copyright Protection Security Protocol in Internet Environment. Chinese Journal of Computers, 29: 9(2006), 1722-1731.

Google Scholar

[11] B.I. Federica, B. C. Giulia and N. Alessandro. Teaching multimedia data protection through an international online competition. IEEE Transactions on Education, 54: 3(2011), 381-385.

Google Scholar

[12] X.P. Zhang, S.Z. Wang. C. Chen. Asymmetric fingerprinting scheme without third party authorization. Journal of Harbin Institute of Technology, 38: 7(2006), 727-730.

Google Scholar