期刊文献+

Research on secure buyer-seller watermarking protocol

Research on secure buyer-seller watermarking protocol
在线阅读 下载PDF
导出
摘要 A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页 系统工程与电子技术(英文版)
基金 Internation al S&T Cooperation Project from National Ministry of Science and Technology(2006D FA73180) Research Fund for the Doc toral Program of Higher Education of China (20060497005).
关键词 watermarking protocol zero knowledge proof distributed certification authorities. watermarking protocol zero knowledge proof distributed certification authorities.
  • 相关文献

参考文献1

二级参考文献20

  • 1Kalkcr T, Linnartz YP, Dijk MV. Watermark estimation through detector analysis. In: Proc of the IEEE Int'l Conf. on Image Processing (ICIP'98). Los Alamitos: IEEE Computer Society Press, 1998.425-429.
  • 2Kinoshita H. An image digital signature system with zkip for the graph isomorphism problem In: Proc. of the IEEE Conf, on Image Processing (ICIP'96), Vol 3. Los Alamitos: IEEE Computer Society Press, 1996. 247-250.
  • 3Gopalakrishnan K, Memon N, Vora P. Protocols for watermark verification: Multimedia and security. IEEE Multimedia, 2001,8(4):66-70.
  • 4Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing,1997,6(12): 1673-1687.
  • 5Craver S. Zero knowledge watermark deteetion. In: Information Hiding: The 3rd Int'l Workshop. LNCS 1768, Berlin:Springer-Verlag, 2000. 101-116.
  • 6Adelsbach A, Katzenbeisser S, Sadeghi AR. Watermark detection with zero-knowledge disclosure. ACM Multimedia Systems Journal, 2003,9(3):266-278.
  • 7Adelsbach A, Katzenbeisser S, Sadeghi AR. Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure. In: Proc. of the European Signal Processing Conf. (EUSIPCO 2002). 2002. 446-449.
  • 8Adelsbach A, Sadeghi R. Zero knowledge watermark detection and proof of ownership. In: Information Hiding: The 4th Int'l Workshop. LNCS 2137, Berlin: Springer Verlag, 2001. 273-287.
  • 9邹萧湘 戴琼 黄晁 李锦涛.零知识水印验证协议.软件学报,2003,14(9):1645—1651[J].http://www.jos.org.cn/1000.9825/14/1645.pdf,:.
  • 10Craver S, Memon N, Yeo BL, Yeung MM. Resolving rightful ownerships with invisible watermarking techniques: Limitations,attacks, and implications. IEEE Journal on Selected Area in Communications, 1998,16(4):573-586.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部