A verifiable and secret buyer-seller watermarking protocol

Chin Ling Chen, Chin Chang Chen, De Kui Li, Po Yueh Chen

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer-seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer’s watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer’s rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer’s watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.

Original languageEnglish
Pages (from-to)104-113
Number of pages10
JournalIETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
Volume32
Issue number2
DOIs
Publication statusPublished - 2015 Mar 1

Fingerprint

Watermarking
Costs

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

@article{4c56a4ddbd444096b1798cc0510d413f,
title = "A verifiable and secret buyer-seller watermarking protocol",
abstract = "A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer-seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer’s watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer’s rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer’s watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.",
author = "Chen, {Chin Ling} and Chen, {Chin Chang} and Li, {De Kui} and Chen, {Po Yueh}",
year = "2015",
month = "3",
day = "1",
doi = "10.1080/02564602.2014.983565",
language = "English",
volume = "32",
pages = "104--113",
journal = "IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)",
issn = "0256-4602",
publisher = "Medknow Publications and Media Pvt. Ltd",
number = "2",

}

A verifiable and secret buyer-seller watermarking protocol. / Chen, Chin Ling; Chen, Chin Chang; Li, De Kui; Chen, Po Yueh.

In: IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), Vol. 32, No. 2, 01.03.2015, p. 104-113.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A verifiable and secret buyer-seller watermarking protocol

AU - Chen, Chin Ling

AU - Chen, Chin Chang

AU - Li, De Kui

AU - Chen, Po Yueh

PY - 2015/3/1

Y1 - 2015/3/1

N2 - A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer-seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer’s watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer’s rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer’s watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.

AB - A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer-seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, embedded in digital content, and the transaction number produced by the seller; the seller can verify buyer’s watermark without decryption. After inserting a digital watermark from the seller, the buyer cannot remove the watermark from the digital content without a watermark extraction algorithm. The seller cannot fabricate piracy to frame an innocent buyer. When piracy is found, it can be traced clearly because of the privacy homomorphism property. In other words, the proposed protocol can trace piracy and protect the customer’s rights without a TTP. Therefore, the conspiracy problem can be solved. The proposed protocol also can protect the anonymity of the buyer and bind the buyer’s watermark to digital content. Moreover, the buyer is no longer required to participate in the dispute resolution in our scheme.

UR - http://www.scopus.com/inward/record.url?scp=85021188946&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85021188946&partnerID=8YFLogxK

U2 - 10.1080/02564602.2014.983565

DO - 10.1080/02564602.2014.983565

M3 - Article

AN - SCOPUS:85021188946

VL - 32

SP - 104

EP - 113

JO - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

JF - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

SN - 0256-4602

IS - 2

ER -