Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 4 - Volume 4
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers’ intended security criteria by showing that an attacker can actually: (1) discover the unique buyer’s watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks.