IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Partial encryption and watermarking scheme for audio files with controlled degradation of quality
Multimedia Tools and Applications
Hi-index | 0.00 |
Analysis by Forrester research revealed that 18% of global exports will flow online in 2004 and that the volume of e-commerce will surpass $400 billion. Digital rights protection is a major issue in the e-commerce of multimedia contents. Watermarking technology has been proposed as a promising enabling technology for the rights protection of multimedia digital contents. A unique watermark is embedded in each piece of multimedia contents before it is distributed to a customer. When unauthorized copies of a piece of contents are found, the customer who owns the contents can be readily identified by means of the embedded watermark. However, the unauthorized copies may also come from the content provider itself. It is therefore a challenging problem to determine whether an unauthorized copy is distributed by an unethical customer or by an unethical content provider.In this paper, we propose a watermarking protocol to address the problem using cryptographic technologies. Our protocol employs a commutative encryption algorithm to protect the privacy of watermarks. Information is doubly locked by two encryption keys keptseparately by a customer and a content provider. In the protocol, a customer only gets a piece of watermarked multimedia contents in a transaction and the content provider has no ideahow the watermark is formed. This facilitates the authority to determine the unethical partyin case of unauthorized distribution of digital contents. We also discuss a couple of common attacks and show that our protocol can defend successfully against them.