AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET

Ibrahim M. Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy

2007

Abstract

Different buyer-seller watermarking protocols have been proposed to address preserving the digital rights of both the buyer and the seller over the first-hand market. However, the support of the digital rights over the second-hand market is still rarely addressed. This paper proposes an effective and secure watermarking protocol for digital rights protection over the second-hand market. This protocol achieves customer’s rights protection, copy deterrence, protocols' practice applicability, preventing the buyer’s participation in the dispute resolution and defending man in the middle attack along with solving the unbinding and conspiracy problems over the second-hand market. The protocol's security is based on the public key infrastructure (PKI) and exploits the existence of the certification authority (CA) that is considered the only trust anchor between the buyer and the seller.

References

  1. R. Rivest, A. Shamir and L. Adelman, 1978. “A method for obtaining digital signatures and public key cryptosystems”. In Commun. ACM, Vol. 21, pp. 120- 126.
  2. J. D. Cohen and M. J. Fischer, Oct. 21-23, 1985. “A robust and verifiable cryptographically secure election scheme (extended abstract)”. In Proc. IEEE 26th Annu. Symp. Foundations Computer Science, Portland, OR, pp. 372-382.
  3. D. Stinson, 1995. In Cryptography: Theory and Practice. Boca Raton, FL: CRC.
  4. L.Qian and K.Nahrstedt, Seprember 1998. “Watermarking schemes and protocols for protecting rightful ownership and customer's rights”. In J. Visual Commun. Image Represent., Vol. 9, pp. 194-210.
  5. Memon N. and Wong P.W., 2001. “A buyer-seller watermarking protocol”. In IEEE Trans. Image Process., Vol. 10, No. 4, pp. 643-649.
  6. S. Katzenbeisser, Sept. 2001. “On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking”. In Proc. 12th Int. Workshop Database and Expert Systems Applicat., pp. 815-819.
  7. Ju, H.S., Kim, H.J., Lee, D.H., and Lim, J.I., 2002. “An anonymous buyer-seller watermarking protocol with anonymity control”, In Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC, LNCS 2587, pp. 421-432.
  8. Shing-Chi Cheung and Hanif Curreem, 2002. “Rights Protection for Digital Contents Redistribution Over the Internet”. In COMPSAC 2002: 105-110.
  9. R. Housley, W. Polk, W. Ford, and D. Solo, Apr. 2002. “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile”. In RFC 3280.
  10. Chin-Chen Chang, Chi-Yien Chung, 2003. “An Enhanced Buyer Seller Watermarking Protocol“. In Proceedings of ICCT.
  11. Lei C.-L., Yu P.-L., Tsai P.-L., and Chan M.-H., 2004. “An efficient and anonymous buyer-seller watermarking protocol”. In IEEE Trans. Image Process, Vol. 13, No. 12, pp. 1618-1626.
  12. J.Zhang, W.Kou and K.Fan, March 2006. “Secure buyerseller watermarking protocol”. In IEE Proc.-Inf. Secur., Vol. 153, No. 1.
Download


Paper Citation


in Harvard Style

M. Ibrahim I., Hazem Nour El-Din S. and Fatah A. Hegazy A. (2007). AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 263-268. DOI: 10.5220/0002121202630268


in Bibtex Style

@conference{secrypt07,
author={Ibrahim M. Ibrahim and Sherif Hazem Nour El-Din and Abdel Fatah A. Hegazy},
title={AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={263-268},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002121202630268},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET
SN - 978-989-8111-12-8
AU - M. Ibrahim I.
AU - Hazem Nour El-Din S.
AU - Fatah A. Hegazy A.
PY - 2007
SP - 263
EP - 268
DO - 10.5220/0002121202630268