A Secure and Efficient Buyer-Seller Watermarking Protocol

Article Preview

Abstract:

A number of different buyer-seller watermarking protocols have been proposed to address preserving the rights of both the buyer and the seller. However, these existing schemes are inefficient and impractical for their high computation and bandwidth overhead. To this end, we propose a new buyer-seller watermarking protocol, where the multimedia data is encrypted using a symmetric cipher, and the public-key cipher is only used to key exchanging and data signing. Compared with the existing schemes, our scheme requires a lower computing power and communication bandwidth. In addition, some main drawbacks of those previous schemes are overcome in our scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

898-902

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Qiao and K. Nahrstedt, Watermarking schemes and protocols for protecting rightful ownership and customer's rights, J. Vis. Commun. Image Representation, vol. 9, no. 9, pp.194-210, (1998).

DOI: 10.1006/jvci.1998.0391

Google Scholar

[2] N. Memon and P. W. Wong, A buyer-seller watermarking protocol, IEEE Trans. Image Process, vol. 10, no. 4 pp.643-649, (2001).

DOI: 10.1109/83.913598

Google Scholar

[3] Defa Hu and Qiaoliang Li. Asymmetric fingerprinting based on 1-out-of-n oblivious transfer. IEEE Communications Letters, vol. 14, no. 5, pp.453-455, (2010).

DOI: 10.1109/lcomm.2010.05.100067

Google Scholar

[4] H. -S. Ju et al., An anonymous buyer-seller watermarking protocol with anonymity control, Lecture notes in computer science, vol. 2587, pp.421-432, (2002).

DOI: 10.1007/3-540-36552-4_29

Google Scholar

[5] C. L. Lei et al., An efficient and anonymous buyer-seller watermarking protocol, IEEE Trans. Image Process, vol. 13, no. 12, pp.1618-1626, (2004).

DOI: 10.1109/tip.2004.837553

Google Scholar

[6] J. Zhang, W. Kou, and K. Fan, Secure buyer-seller watermarking protocol, IEEE Proceedings Information Security, vol. 153, no. 1, pp.15-18, (2006).

DOI: 10.1049/ip-ifs:20055069

Google Scholar

[7] Franco Frattolillo, Watermarking Protocol for Web Context, IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp.350-363, (2007).

DOI: 10.1109/tifs.2007.903849

Google Scholar

[8] Liu Quan, Chen Zheng, Zhou Zude, Research on secure buyer-seller watermarking protocol, Journal of Systems Engineering and Electronics, vol. 19, no. 2, pp.370-376, (2008).

DOI: 10.1016/s1004-4132(08)60094-8

Google Scholar