A secure watermarking scheme for buyer-seller identification and copyright protection

被引:3
|
作者
Ahmed, Fawad [1 ]
Sattar, Farook [1 ]
Siyal, Mohammed Yakoob [1 ]
Yu, Dan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Information Technology; Quantum Information; Watermark Image; Watermark Scheme; Copyright Protection;
D O I
10.1155/ASP/2006/56904
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues - buyer- seller identification, copyright infringement, and ownership verification. By buyer- seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/ her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/ seller with their respective watermarked images. Copyright (C) 2006 Hindawi Publishing Corporation. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [22] An efficient and impartial buyer-seller watermarking protocol
    School of Information Science and Engineering, Qufu Normal University, Rizhao
    Shandong
    276826, China
    不详
    Shandong
    276826, China
    J. Commun., 5 (339-344):
  • [23] Bandwidth efficient buyer-seller watermarking protocol
    Xu, Zhongqiu
    Li, Liangju
    Gao, Haibo
    International Journal of Information and Computer Security, 2012, 5 (01) : 1 - 10
  • [24] A secure watermarking scheme for copyright protection
    Zhang, JS
    Tian, L
    Tai, HM
    Wang, CJ
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXVII, PTS 1AND 2, 2004, 5558 : 867 - 873
  • [25] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [26] Buyer-seller watermarking protocol: Problems and solutions
    Chen, Dangui
    Zeng, Xiliang
    International Review on Computers and Software, 2012, 7 (03) : 1204 - 1208
  • [27] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [28] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557
  • [29] An efficient buyer-seller watermarking protocol with multicast
    Hu, Defa
    Luo, Juanjuan
    International Review on Computers and Software, 2011, 6 (03) : 389 - 392
  • [30] An efficient and anonymous buyer-seller watermarking protocol
    Lei, CL
    Yu, PL
    Tsai, PL
    Chan, MH
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) : 1618 - 1626