ANONYMOUS BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM

Mina Deng, Li Weng, Bart Preneel

2008

Abstract

Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute resolution, non-framing, and non-repudiation. Another distinct feature is the improvement of the protocol’s utility, such that the double watermark insertion mechanism is avoided; the final quality of the distributed content is improved; the communication expansion ratio and computation complexity are reduced, comparing with conventional schemes.

References

  1. Benaloh, J. (1994). Dense probabilistic encryption. In Proc. Selected Areas of Cryptography (SAC'94), pages 120- 128.
  2. Biehl, I. and Meyer, B. (1997). Protocols for collusionsecure asymmetric fingerprinting. In Proc. 14th STACS, LNCS 1200, pages 213-222. Springer-Verlag.
  3. Blakley, G. R., Meadows, C., and Prudy, G. B. (1985). Fingerprinting long forgiving messages. In Advances in Cryptology - CRYPTO 85, LNCS 218, pages 180-189. Springer-Verlag.
  4. Boneh, D. and Shaw, J. (1995). Collusion-secure fingerprinting for digital data. LNCS 963, pages 452-465.
  5. Camenisch, J. (2000). Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428. Springer-Verlag.
  6. Camenisch, J. and Damga°rd, I. (1998). Verifiable encryption and applications to group signatures and signature sharing. In Technical Report RS-98-32, BRICS, Department of Computer Science, University of Aarhus.
  7. Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673- 1687.
  8. Frattolillo, F. (2007). Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security, 2(3):350-363.
  9. Goi, B.-M., Phan, R. C.-W., Yang, Y., Bao, F., Deng, R. H., and Siddiqi, M. U. (2004). Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In Applied Cryptography and Network Security, LNCS 2587, pages 369-382.
  10. Goldwasser, S. and Micali, S. (1982). Probabilistic encryption and how to play mental poker hiding all partial information. In Proceedings of the 14th Annual ACM Symposium on the Theory of Computing, pages 365- 377.
  11. Ibrahim, I. M., El-Din, S. H. N., and Hegazy, A. F. A. (2007). An effective and secure buyer-seller watermarking protocol. In Third International Symposium onInformation Assurance and Security, 2007. IAS 2007, pages 21-28.
  12. Jae-Gwi Choi, Kouichi Sakurai, J.-H. P. (2003). Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. In Applied Cryptography and Network Security, LNCS 2846, pages 265-279.
  13. Ju, H.-S., Kim, H.-J., Lee, D.-H., and Lim, J.-I. (2002). An anonymous buyer-seller watermarking protocol with anonymity control. Information Security and Cryptology - ICISC, pages 421-432.
  14. Jurik, I. D. M. (2001). A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136. Springer-Verlag.
  15. Kuribayashi, M. and Tanaka, H. (2005). Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing, 14(12):2129-2139.
  16. Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H. (2004). An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618-1626.
  17. Liu, K., Trappe, W., Wang, Z., Wu, M., and Zhao, H. (2005). Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Co.
  18. Memon, N. D. and Wong, P. W. (2001). A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643-649.
  19. Naccache, D. and Stern, J. (1998). A new public-key cryptosystem based on higher residues. In 5th ACM Conference on Computer and Communications Security, pages 59-66. ACM.
  20. Okamoto, T. and Uchiyama, S. (1998). A new publickey cryptosystem as secure as factoring. In Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pages 308-318. Springer-Verlag.
  21. Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pages 223-238. Springer-Verlag.
  22. Pfitzmann, B. and Sadeghi, A.-R. (1999). Coin-based anonymous fingerprinting. In Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pages 150-164. Springer-Verlag.
  23. Pfitzmann, B. and Sadeghi, A.-R. (2000). Anonymous fingerprinting with direct non-repudiation. In Advances in Cryptology - ASIACRYPT 7800, LNCS 1976, pages 401-414. Springer-Verlag.
  24. Pfitzmann, B. and Waidner, M. (1997). Anonymous fingerprinting. In Advances in Cryptology - EUROCRYPT'97, pages 88-102.
  25. Pittzmann, B. and Schunter, M. (1996). Asymmetric fngerprinting. In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pages 84-95. SpringerVerlag.
  26. Qiao, L. and Nahrstedt, K. (1998). Watermarking schemes and protocols for protecting rightful ownership and customer's rights. Journal of Visual Communication and Image Representation, 9(3):194 - 210.
  27. Trappe, W., Wu, M., Wang, Z. J., and Liu, K. J. R. (2003). Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing, 51(4):1069 - 1087.
  28. Wang, Z. J., Wu, M., Zhao, H. V., Trappe, W., and Liu, K. J. R. (2005). Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing, 14(6):804 - 821.
  29. Zhang, J., Kou, W., and Fan, K. (2006). Secure buyer-seller watermarking protocol. In IEE Proceedings Information Security, volume 153, pages 15-18.
Download


Paper Citation


in Harvard Style

Deng M., Weng L. and Preneel B. (2008). ANONYMOUS BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM . In Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008) ISBN 978-989-8111-60-9, pages 300-307. DOI: 10.5220/0001934303000307


in Bibtex Style

@conference{sigmap08,
author={Mina Deng and Li Weng and Bart Preneel},
title={ANONYMOUS BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008)},
year={2008},
pages={300-307},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001934303000307},
isbn={978-989-8111-60-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2008)
TI - ANONYMOUS BUYER-SELLER WATERMARKING PROTOCOL WITH ADDITIVE HOMOMORPHISM
SN - 978-989-8111-60-9
AU - Deng M.
AU - Weng L.
AU - Preneel B.
PY - 2008
SP - 300
EP - 307
DO - 10.5220/0001934303000307