You are not logged in.
Openly accessible

Secure buyer - seller watermarking protocol

Zhang, Jun, Kou, Weidong and Fan, Kai 2006, Secure buyer - seller watermarking protocol, Information Security - IEEE Proceedings, vol. 153, no. 1, pp. 15-18, doi: 10.1049/ip-ifs:20055069.

Attached Files
Name Description MIMEType Size Downloads
zhang-securebuyer-2006.pdf Published version application/pdf 149.08KB 249

Title Secure buyer - seller watermarking protocol
Author(s) Zhang, Jun
Kou, Weidong
Fan, Kai
Journal name Information Security - IEEE Proceedings
Volume number 153
Issue number 1
Start page 15
End page 18
Publisher Institution of Engineering and Technology
Place of publication Herts, England
Publication date 2006-03
ISSN 1747-0722
Summary In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that a protocol is fair to both the seller and buyer in a digital content transaction. However, the TTP decreases the security and affects the protocol implementation. To address this issue, in this article a secure buyer–seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer. Based on the idea of sharing a secret, a watermark embedded in digital content to trace piracy is composed of two pieces of secret information, one produced by the seller and one by the buyer. Since neither knows the exact watermark, the buyer cannot remove the watermark from watermarked digital content, and at the same time the seller cannot fabricate piracy to frame an innocent buyer. In other words, the proposed protocol can trace piracy and protect the customer’s rights. In addition, because no third party is introduced into the proposed protocol, the problem of a seller (or a buyer) colluding with a third party to cheat the buyer (or the seller), namely, the conspiracy problem, can be avoided.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Language eng
DOI 10.1049/ip-ifs:20055069
Field of Research 080303 Computer System Security
Socio Economic Objective 810107 National Security
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2006, IEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30039531

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 46 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 237 Abstract Views, 249 File Downloads  -  Detailed Statistics
Created: Wed, 26 Oct 2011, 12:48:01 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.