吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 1447-1452.doi: 10.7964/jdxbgxb201405036

Previous Articles     Next Articles

Buyer-seller watermarking protocol for unbinding problem

WEN Quan1,WANG Yu-fei2,ZHANG Xin-peng3   

  1. 1.College of Communication Engineering, Jilin University, Changchun 130022, China;
    2.School of Information and Technology, Jilin Normal University, Siping 136000, China;
    3.School of Communication & Information Engineering, Shanghai University, Shanghai 200072, China
  • Received:2013-06-13 Online:2014-09-01 Published:2014-09-01

Abstract: The idea of embedding watermark at the client side is proposed base on the separable encrypted watermarking algorithm. Three sub-protocols are developed, which are watermarking embedding sub-protocol, watermarking disputing sub-protocol, and unbinding problem disputing sub-protocol. At the same time, some theoretical vulnerabilities are compensated further by combining partial encryption and permutation function about cryptography. Theoretical analysis and simulation results show that the watermarking protocol developed in this paper can effectively resolve not only the unbinding problem, but also the thread caused by role integrity, and avoid the influence of full encryption on the protocol performance.

Key words: information processing, digital watermarking, reversible data hiding, digital rights management

CLC Number: 

  • TN915.08
[1] Lei Lei Win, Thomas Tony, Emmanuel Sabu. Privacy enabled digital rights management without trusted third party assumption[J]. IEEE Transactions Multimedia, 2012, 14(5):546-554.
[2] Qing Si-han. Twenty years development of security protocols research[J]. Journal of Software, 2003, 14(10):1740-1752.
[3] Qiao L, Nahrstedt K. Watermarking scheme and protocols for protecting rightful ownership and customer's rights[J]. J Vis Commun, Image Representation, 1998, 9(9):194-210.
[4] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Trans Image Process, 2001,10(4):643-649.
[5] Lei Chin-Laung, Yu Pei-Ling, Tsai Pan-lung, et al. An efficient and anonymous buyer-seller watermarking protocol[J]. IEEE Transaction on Image Processing,2004,13(12): 1618-1626.
[6] Frattolillo Franco. Watermarking protocol for web context[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(3):350-363.
[7] Chen Tzung-Her, Horng Gwoboa. A lightweight and anonymous copyright-protection protocol[J]. Computer Standards & Interface, 2007,29(2):229-237.
[8] Deng M, Bianchi T, Piva A, et al. An efficient buyer-seller watermarking protocol based on composite signal representation[C]∥Proc 11th ACM Workshop on Multimedia and Security, Princeton, NJ, New York, ACM, 2009:9-18.
[9] Rial Alfredo. A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer[J]. IEEE Transaction on Information Forensics and Security, 2011, 6(1):202-212.
[10] Katzenbeisser Stefan, Lemma Aweke, Celik Mehmet,et al. A buyer-seller watermarking protocol based on secure embedding[J]. IEEE Transaction on Information Forensics and Security, 2008, 3(4):783-786.
[11] Zhang Xin-peng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters,2011,18(4):255-258.
[12] Zhang Xin-peng. Separable reversible data hiding in encrypted image[J]. IEEE Transaction on Information Forensics and Security,2012,7(2):826-832.
[13] Adelsbach A, Katzenbeisser S, Sadeghi A R. Watermark detection with zero-knowledge disclosure[J]. ACM Multimedia Systems Journal, 2003, 9(3):266-278.
[1] YING Huan,LIU Song-hua,TANG Bo-wen,HAN Li-fang,ZHOU Liang. Efficient deterministic replay technique based on adaptive release strategy [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1917-1924.
[2] LIU Zhong-min,WANG Yang,LI Zhan-ming,HU Wen-jin. Image segmentation algorithm based on SLIC and fast nearest neighbor region merging [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1931-1937.
[3] SHAN Ze-biao,LIU Xiao-song,SHI Hong-wei,WANG Chun-yang,SHI Yao-wu. DOA tracking algorithm using dynamic compressed sensing [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1938-1944.
[4] YAO Hai-yang, WANG Hai-yan, ZHANG Zhi-chen, SHEN Xiao-hong. Reverse-joint signal detection model with double Duffing oscillator [J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290.
[5] QUAN Wei, HAO Xiao-ming, SUN Ya-dong, BAI Bao-hua, WANG Yu-ting. Development of individual objective lens for head-mounted projective display based on optical system of actual human eye [J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297.
[6] CHEN Mian-shu, SU Yue, SANG Ai-jun, LI Pei-peng. Image classification methods based on space vector model [J]. 吉林大学学报(工学版), 2018, 48(3): 943-951.
[7] CHEN Tao, CUI Yue-han, GUO Li-min. Improved algorithm of multiple signal classification for single snapshot [J]. 吉林大学学报(工学版), 2018, 48(3): 952-956.
[8] MENG Guang-wei, LI Rong-jia, WANG Xin, ZHOU Li-ming, GU Shuai. Analysis of intensity factors of interface crack in piezoelectric bimaterials [J]. 吉林大学学报(工学版), 2018, 48(2): 500-506.
[9] LIN Jin-hua, WANG Yan-jie, SUN Hong-hai. Improved feature-adaptive subdivision for Catmull-Clark surface model [J]. 吉林大学学报(工学版), 2018, 48(2): 625-632.
[10] WANG Ke, LIU Fu, KANG Bing, HUO Tong-tong, ZHOU Qiu-zhan. Bionic hypocenter localization method inspired by sand scorpion in locating preys [J]. 吉林大学学报(工学版), 2018, 48(2): 633-639.
[11] YU Hua-nan, DU Yao, GUO Shu-xu. High-precision synchronous phasor measurement based on compressed sensing [J]. 吉林大学学报(工学版), 2018, 48(1): 312-318.
[12] WANG Fang-shi, WANG Jian, LI Bing, WANG Bo. Deep attribute learning based traffic sign detection [J]. 吉林大学学报(工学版), 2018, 48(1): 319-329.
[13] LIU Dong-liang, WANG Qiu-shuang. Instantaneous velocity extraction method on NGSLM data [J]. 吉林大学学报(工学版), 2018, 48(1): 330-335.
[14] TANG Kun, SHI Rong-hua. Detection of wireless sensor network failure area based on butterfly effect signal [J]. 吉林大学学报(工学版), 2017, 47(6): 1939-1948.
[15] LI Juan, MENG Ke-xin, LI Yue, LIU Hui-li. Seismic signal noise suppression based on similarity matched Wiener filtering [J]. 吉林大学学报(工学版), 2017, 47(6): 1964-1968.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!