An efficient and anonymous buyer-seller watermarking protocol

For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing 2004-12, Vol.13 (12), p.1618-1626
Hauptverfasser: LEI, Chin-Laung, YU, Pei-Ling, TSAI, Pan-Lung, CHAN, Ming-Hwa
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1626
container_issue 12
container_start_page 1618
container_title IEEE transactions on image processing
container_volume 13
creator LEI, Chin-Laung
YU, Pei-Ling
TSAI, Pan-Lung
CHAN, Ming-Hwa
description For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.
doi_str_mv 10.1109/TIP.2004.837553
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_16266509</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355941</ieee_id><sourcerecordid>2426199671</sourcerecordid><originalsourceid>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</originalsourceid><addsrcrecordid>eNqFks9r2zAUx0VZabu05x4Gwwy6npzoSX6SfdghlK0tFNpDehayLBV3jt1JNiX_fV9IILDDdhBPSJ_38_sYuwQ-B-DVYnX_NBecF_NSakR5xM6gKiCnF_GJ7hx1rqGoTtnnlF45hwJBnbBTQNQIqM7Yj2Wf-RBa1_p-zGzf0Bn6zXqYUlZPGx_z5LvOx-zdjj6ubfzd9i_ZWxzGwQ3dOTsOtkv-Ym9n7PnXz9XNXf7weHt_s3zIHRZ8zGsdPGJtNbjSBSkFiEJWUhfQWFGDrQvQ1pdYSQ6qUc41NjiolVIlF1oHOWPXu7iU-M_k02jWbXJUmO09VWoq8lOSKyDy-z9JReOQSlX_BUUpK6VREvjtL_B1mGJP7ZqylCiBc0HQYge5OKQUfTBvsaVpbQxws1XKkFJmq5TZKUUeX_dhp3rtmwO_l4aAqz1gk7NdiLZ3bTpwSiiFfNvIlx3Xeu8P3xKRNkF-AN4pojg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>883531002</pqid></control><display><type>article</type><title>An efficient and anonymous buyer-seller watermarking protocol</title><source>IEEE Electronic Library (IEL)</source><creator>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</creator><creatorcontrib>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</creatorcontrib><description>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</description><identifier>ISSN: 1057-7149</identifier><identifier>EISSN: 1941-0042</identifier><identifier>DOI: 10.1109/TIP.2004.837553</identifier><identifier>PMID: 15575156</identifier><identifier>CODEN: IIPRE4</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Access protocols ; Algorithms ; Applied sciences ; Arbitration ; Certification ; Computer Graphics ; Computer Security ; Consumer Product Safety ; Contact ; Copyright protection ; Cryptography ; digital watermark ; Distributors ; Exact sciences and technology ; Hypermedia ; Image Interpretation, Computer-Assisted - methods ; Information Storage and Retrieval - methods ; Information, signal and communications theory ; Intellectual property ; Internet ; Multimedia ; Patents as Topic ; Pattern Recognition, Automated - methods ; Privacy ; Product Labeling - methods ; Protection ; Reproducibility of Results ; Reproduction ; Robustness ; Security ; Sensitivity and Specificity ; Signal and communications theory ; Signal Processing, Computer-Assisted ; Telecommunications and information theory ; Unauthorized ; Watermarking</subject><ispartof>IEEE transactions on image processing, 2004-12, Vol.13 (12), p.1618-1626</ispartof><rights>2005 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</citedby><cites>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1355941$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1355941$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16266509$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/15575156$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>LEI, Chin-Laung</creatorcontrib><creatorcontrib>YU, Pei-Ling</creatorcontrib><creatorcontrib>TSAI, Pan-Lung</creatorcontrib><creatorcontrib>CHAN, Ming-Hwa</creatorcontrib><title>An efficient and anonymous buyer-seller watermarking protocol</title><title>IEEE transactions on image processing</title><addtitle>TIP</addtitle><addtitle>IEEE Trans Image Process</addtitle><description>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</description><subject>Access protocols</subject><subject>Algorithms</subject><subject>Applied sciences</subject><subject>Arbitration</subject><subject>Certification</subject><subject>Computer Graphics</subject><subject>Computer Security</subject><subject>Consumer Product Safety</subject><subject>Contact</subject><subject>Copyright protection</subject><subject>Cryptography</subject><subject>digital watermark</subject><subject>Distributors</subject><subject>Exact sciences and technology</subject><subject>Hypermedia</subject><subject>Image Interpretation, Computer-Assisted - methods</subject><subject>Information Storage and Retrieval - methods</subject><subject>Information, signal and communications theory</subject><subject>Intellectual property</subject><subject>Internet</subject><subject>Multimedia</subject><subject>Patents as Topic</subject><subject>Pattern Recognition, Automated - methods</subject><subject>Privacy</subject><subject>Product Labeling - methods</subject><subject>Protection</subject><subject>Reproducibility of Results</subject><subject>Reproduction</subject><subject>Robustness</subject><subject>Security</subject><subject>Sensitivity and Specificity</subject><subject>Signal and communications theory</subject><subject>Signal Processing, Computer-Assisted</subject><subject>Telecommunications and information theory</subject><subject>Unauthorized</subject><subject>Watermarking</subject><issn>1057-7149</issn><issn>1941-0042</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>EIF</sourceid><recordid>eNqFks9r2zAUx0VZabu05x4Gwwy6npzoSX6SfdghlK0tFNpDehayLBV3jt1JNiX_fV9IILDDdhBPSJ_38_sYuwQ-B-DVYnX_NBecF_NSakR5xM6gKiCnF_GJ7hx1rqGoTtnnlF45hwJBnbBTQNQIqM7Yj2Wf-RBa1_p-zGzf0Bn6zXqYUlZPGx_z5LvOx-zdjj6ubfzd9i_ZWxzGwQ3dOTsOtkv-Ym9n7PnXz9XNXf7weHt_s3zIHRZ8zGsdPGJtNbjSBSkFiEJWUhfQWFGDrQvQ1pdYSQ6qUc41NjiolVIlF1oHOWPXu7iU-M_k02jWbXJUmO09VWoq8lOSKyDy-z9JReOQSlX_BUUpK6VREvjtL_B1mGJP7ZqylCiBc0HQYge5OKQUfTBvsaVpbQxws1XKkFJmq5TZKUUeX_dhp3rtmwO_l4aAqz1gk7NdiLZ3bTpwSiiFfNvIlx3Xeu8P3xKRNkF-AN4pojg</recordid><startdate>20041201</startdate><enddate>20041201</enddate><creator>LEI, Chin-Laung</creator><creator>YU, Pei-Ling</creator><creator>TSAI, Pan-Lung</creator><creator>CHAN, Ming-Hwa</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20041201</creationdate><title>An efficient and anonymous buyer-seller watermarking protocol</title><author>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Access protocols</topic><topic>Algorithms</topic><topic>Applied sciences</topic><topic>Arbitration</topic><topic>Certification</topic><topic>Computer Graphics</topic><topic>Computer Security</topic><topic>Consumer Product Safety</topic><topic>Contact</topic><topic>Copyright protection</topic><topic>Cryptography</topic><topic>digital watermark</topic><topic>Distributors</topic><topic>Exact sciences and technology</topic><topic>Hypermedia</topic><topic>Image Interpretation, Computer-Assisted - methods</topic><topic>Information Storage and Retrieval - methods</topic><topic>Information, signal and communications theory</topic><topic>Intellectual property</topic><topic>Internet</topic><topic>Multimedia</topic><topic>Patents as Topic</topic><topic>Pattern Recognition, Automated - methods</topic><topic>Privacy</topic><topic>Product Labeling - methods</topic><topic>Protection</topic><topic>Reproducibility of Results</topic><topic>Reproduction</topic><topic>Robustness</topic><topic>Security</topic><topic>Sensitivity and Specificity</topic><topic>Signal and communications theory</topic><topic>Signal Processing, Computer-Assisted</topic><topic>Telecommunications and information theory</topic><topic>Unauthorized</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>LEI, Chin-Laung</creatorcontrib><creatorcontrib>YU, Pei-Ling</creatorcontrib><creatorcontrib>TSAI, Pan-Lung</creatorcontrib><creatorcontrib>CHAN, Ming-Hwa</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on image processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LEI, Chin-Laung</au><au>YU, Pei-Ling</au><au>TSAI, Pan-Lung</au><au>CHAN, Ming-Hwa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An efficient and anonymous buyer-seller watermarking protocol</atitle><jtitle>IEEE transactions on image processing</jtitle><stitle>TIP</stitle><addtitle>IEEE Trans Image Process</addtitle><date>2004-12-01</date><risdate>2004</risdate><volume>13</volume><issue>12</issue><spage>1618</spage><epage>1626</epage><pages>1618-1626</pages><issn>1057-7149</issn><eissn>1941-0042</eissn><coden>IIPRE4</coden><abstract>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</abstract><cop>New York, NY</cop><pub>IEEE</pub><pmid>15575156</pmid><doi>10.1109/TIP.2004.837553</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1057-7149
ispartof IEEE transactions on image processing, 2004-12, Vol.13 (12), p.1618-1626
issn 1057-7149
1941-0042
language eng
recordid cdi_pascalfrancis_primary_16266509
source IEEE Electronic Library (IEL)
subjects Access protocols
Algorithms
Applied sciences
Arbitration
Certification
Computer Graphics
Computer Security
Consumer Product Safety
Contact
Copyright protection
Cryptography
digital watermark
Distributors
Exact sciences and technology
Hypermedia
Image Interpretation, Computer-Assisted - methods
Information Storage and Retrieval - methods
Information, signal and communications theory
Intellectual property
Internet
Multimedia
Patents as Topic
Pattern Recognition, Automated - methods
Privacy
Product Labeling - methods
Protection
Reproducibility of Results
Reproduction
Robustness
Security
Sensitivity and Specificity
Signal and communications theory
Signal Processing, Computer-Assisted
Telecommunications and information theory
Unauthorized
Watermarking
title An efficient and anonymous buyer-seller watermarking protocol
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T16%3A38%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20efficient%20and%20anonymous%20buyer-seller%20watermarking%20protocol&rft.jtitle=IEEE%20transactions%20on%20image%20processing&rft.au=LEI,%20Chin-Laung&rft.date=2004-12-01&rft.volume=13&rft.issue=12&rft.spage=1618&rft.epage=1626&rft.pages=1618-1626&rft.issn=1057-7149&rft.eissn=1941-0042&rft.coden=IIPRE4&rft_id=info:doi/10.1109/TIP.2004.837553&rft_dat=%3Cproquest_RIE%3E2426199671%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=883531002&rft_id=info:pmid/15575156&rft_ieee_id=1355941&rfr_iscdi=true