An efficient and anonymous buyer-seller watermarking protocol
For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on image processing 2004-12, Vol.13 (12), p.1618-1626 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1626 |
---|---|
container_issue | 12 |
container_start_page | 1618 |
container_title | IEEE transactions on image processing |
container_volume | 13 |
creator | LEI, Chin-Laung YU, Pei-Ling TSAI, Pan-Lung CHAN, Ming-Hwa |
description | For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol. |
doi_str_mv | 10.1109/TIP.2004.837553 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pascalfrancis_primary_16266509</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355941</ieee_id><sourcerecordid>2426199671</sourcerecordid><originalsourceid>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</originalsourceid><addsrcrecordid>eNqFks9r2zAUx0VZabu05x4Gwwy6npzoSX6SfdghlK0tFNpDehayLBV3jt1JNiX_fV9IILDDdhBPSJ_38_sYuwQ-B-DVYnX_NBecF_NSakR5xM6gKiCnF_GJ7hx1rqGoTtnnlF45hwJBnbBTQNQIqM7Yj2Wf-RBa1_p-zGzf0Bn6zXqYUlZPGx_z5LvOx-zdjj6ubfzd9i_ZWxzGwQ3dOTsOtkv-Ym9n7PnXz9XNXf7weHt_s3zIHRZ8zGsdPGJtNbjSBSkFiEJWUhfQWFGDrQvQ1pdYSQ6qUc41NjiolVIlF1oHOWPXu7iU-M_k02jWbXJUmO09VWoq8lOSKyDy-z9JReOQSlX_BUUpK6VREvjtL_B1mGJP7ZqylCiBc0HQYge5OKQUfTBvsaVpbQxws1XKkFJmq5TZKUUeX_dhp3rtmwO_l4aAqz1gk7NdiLZ3bTpwSiiFfNvIlx3Xeu8P3xKRNkF-AN4pojg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>883531002</pqid></control><display><type>article</type><title>An efficient and anonymous buyer-seller watermarking protocol</title><source>IEEE Electronic Library (IEL)</source><creator>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</creator><creatorcontrib>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</creatorcontrib><description>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</description><identifier>ISSN: 1057-7149</identifier><identifier>EISSN: 1941-0042</identifier><identifier>DOI: 10.1109/TIP.2004.837553</identifier><identifier>PMID: 15575156</identifier><identifier>CODEN: IIPRE4</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Access protocols ; Algorithms ; Applied sciences ; Arbitration ; Certification ; Computer Graphics ; Computer Security ; Consumer Product Safety ; Contact ; Copyright protection ; Cryptography ; digital watermark ; Distributors ; Exact sciences and technology ; Hypermedia ; Image Interpretation, Computer-Assisted - methods ; Information Storage and Retrieval - methods ; Information, signal and communications theory ; Intellectual property ; Internet ; Multimedia ; Patents as Topic ; Pattern Recognition, Automated - methods ; Privacy ; Product Labeling - methods ; Protection ; Reproducibility of Results ; Reproduction ; Robustness ; Security ; Sensitivity and Specificity ; Signal and communications theory ; Signal Processing, Computer-Assisted ; Telecommunications and information theory ; Unauthorized ; Watermarking</subject><ispartof>IEEE transactions on image processing, 2004-12, Vol.13 (12), p.1618-1626</ispartof><rights>2005 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</citedby><cites>FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1355941$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1355941$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16266509$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/15575156$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>LEI, Chin-Laung</creatorcontrib><creatorcontrib>YU, Pei-Ling</creatorcontrib><creatorcontrib>TSAI, Pan-Lung</creatorcontrib><creatorcontrib>CHAN, Ming-Hwa</creatorcontrib><title>An efficient and anonymous buyer-seller watermarking protocol</title><title>IEEE transactions on image processing</title><addtitle>TIP</addtitle><addtitle>IEEE Trans Image Process</addtitle><description>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</description><subject>Access protocols</subject><subject>Algorithms</subject><subject>Applied sciences</subject><subject>Arbitration</subject><subject>Certification</subject><subject>Computer Graphics</subject><subject>Computer Security</subject><subject>Consumer Product Safety</subject><subject>Contact</subject><subject>Copyright protection</subject><subject>Cryptography</subject><subject>digital watermark</subject><subject>Distributors</subject><subject>Exact sciences and technology</subject><subject>Hypermedia</subject><subject>Image Interpretation, Computer-Assisted - methods</subject><subject>Information Storage and Retrieval - methods</subject><subject>Information, signal and communications theory</subject><subject>Intellectual property</subject><subject>Internet</subject><subject>Multimedia</subject><subject>Patents as Topic</subject><subject>Pattern Recognition, Automated - methods</subject><subject>Privacy</subject><subject>Product Labeling - methods</subject><subject>Protection</subject><subject>Reproducibility of Results</subject><subject>Reproduction</subject><subject>Robustness</subject><subject>Security</subject><subject>Sensitivity and Specificity</subject><subject>Signal and communications theory</subject><subject>Signal Processing, Computer-Assisted</subject><subject>Telecommunications and information theory</subject><subject>Unauthorized</subject><subject>Watermarking</subject><issn>1057-7149</issn><issn>1941-0042</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>EIF</sourceid><recordid>eNqFks9r2zAUx0VZabu05x4Gwwy6npzoSX6SfdghlK0tFNpDehayLBV3jt1JNiX_fV9IILDDdhBPSJ_38_sYuwQ-B-DVYnX_NBecF_NSakR5xM6gKiCnF_GJ7hx1rqGoTtnnlF45hwJBnbBTQNQIqM7Yj2Wf-RBa1_p-zGzf0Bn6zXqYUlZPGx_z5LvOx-zdjj6ubfzd9i_ZWxzGwQ3dOTsOtkv-Ym9n7PnXz9XNXf7weHt_s3zIHRZ8zGsdPGJtNbjSBSkFiEJWUhfQWFGDrQvQ1pdYSQ6qUc41NjiolVIlF1oHOWPXu7iU-M_k02jWbXJUmO09VWoq8lOSKyDy-z9JReOQSlX_BUUpK6VREvjtL_B1mGJP7ZqylCiBc0HQYge5OKQUfTBvsaVpbQxws1XKkFJmq5TZKUUeX_dhp3rtmwO_l4aAqz1gk7NdiLZ3bTpwSiiFfNvIlx3Xeu8P3xKRNkF-AN4pojg</recordid><startdate>20041201</startdate><enddate>20041201</enddate><creator>LEI, Chin-Laung</creator><creator>YU, Pei-Ling</creator><creator>TSAI, Pan-Lung</creator><creator>CHAN, Ming-Hwa</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20041201</creationdate><title>An efficient and anonymous buyer-seller watermarking protocol</title><author>LEI, Chin-Laung ; YU, Pei-Ling ; TSAI, Pan-Lung ; CHAN, Ming-Hwa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c540t-b7fe55ba71c8cf332124393741da2b1ab417ae8593016d6ccdafc1b66680277f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Access protocols</topic><topic>Algorithms</topic><topic>Applied sciences</topic><topic>Arbitration</topic><topic>Certification</topic><topic>Computer Graphics</topic><topic>Computer Security</topic><topic>Consumer Product Safety</topic><topic>Contact</topic><topic>Copyright protection</topic><topic>Cryptography</topic><topic>digital watermark</topic><topic>Distributors</topic><topic>Exact sciences and technology</topic><topic>Hypermedia</topic><topic>Image Interpretation, Computer-Assisted - methods</topic><topic>Information Storage and Retrieval - methods</topic><topic>Information, signal and communications theory</topic><topic>Intellectual property</topic><topic>Internet</topic><topic>Multimedia</topic><topic>Patents as Topic</topic><topic>Pattern Recognition, Automated - methods</topic><topic>Privacy</topic><topic>Product Labeling - methods</topic><topic>Protection</topic><topic>Reproducibility of Results</topic><topic>Reproduction</topic><topic>Robustness</topic><topic>Security</topic><topic>Sensitivity and Specificity</topic><topic>Signal and communications theory</topic><topic>Signal Processing, Computer-Assisted</topic><topic>Telecommunications and information theory</topic><topic>Unauthorized</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>LEI, Chin-Laung</creatorcontrib><creatorcontrib>YU, Pei-Ling</creatorcontrib><creatorcontrib>TSAI, Pan-Lung</creatorcontrib><creatorcontrib>CHAN, Ming-Hwa</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on image processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LEI, Chin-Laung</au><au>YU, Pei-Ling</au><au>TSAI, Pan-Lung</au><au>CHAN, Ming-Hwa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An efficient and anonymous buyer-seller watermarking protocol</atitle><jtitle>IEEE transactions on image processing</jtitle><stitle>TIP</stitle><addtitle>IEEE Trans Image Process</addtitle><date>2004-12-01</date><risdate>2004</risdate><volume>13</volume><issue>12</issue><spage>1618</spage><epage>1626</epage><pages>1618-1626</pages><issn>1057-7149</issn><eissn>1941-0042</eissn><coden>IIPRE4</coden><abstract>For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.</abstract><cop>New York, NY</cop><pub>IEEE</pub><pmid>15575156</pmid><doi>10.1109/TIP.2004.837553</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1057-7149 |
ispartof | IEEE transactions on image processing, 2004-12, Vol.13 (12), p.1618-1626 |
issn | 1057-7149 1941-0042 |
language | eng |
recordid | cdi_pascalfrancis_primary_16266509 |
source | IEEE Electronic Library (IEL) |
subjects | Access protocols Algorithms Applied sciences Arbitration Certification Computer Graphics Computer Security Consumer Product Safety Contact Copyright protection Cryptography digital watermark Distributors Exact sciences and technology Hypermedia Image Interpretation, Computer-Assisted - methods Information Storage and Retrieval - methods Information, signal and communications theory Intellectual property Internet Multimedia Patents as Topic Pattern Recognition, Automated - methods Privacy Product Labeling - methods Protection Reproducibility of Results Reproduction Robustness Security Sensitivity and Specificity Signal and communications theory Signal Processing, Computer-Assisted Telecommunications and information theory Unauthorized Watermarking |
title | An efficient and anonymous buyer-seller watermarking protocol |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T16%3A38%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20efficient%20and%20anonymous%20buyer-seller%20watermarking%20protocol&rft.jtitle=IEEE%20transactions%20on%20image%20processing&rft.au=LEI,%20Chin-Laung&rft.date=2004-12-01&rft.volume=13&rft.issue=12&rft.spage=1618&rft.epage=1626&rft.pages=1618-1626&rft.issn=1057-7149&rft.eissn=1941-0042&rft.coden=IIPRE4&rft_id=info:doi/10.1109/TIP.2004.837553&rft_dat=%3Cproquest_RIE%3E2426199671%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=883531002&rft_id=info:pmid/15575156&rft_ieee_id=1355941&rfr_iscdi=true |