A TTP watermarking protocol based on visual cryptography

被引:0
作者
Wu, Baiyan [1 ,2 ]
Peng, Yuwei [3 ]
Wang, Chao [4 ]
机构
[1] Hunan Univ Sci & Technol, Natl Local Joint Engn Lab Geospatial Informat Tec, Xiangtan 411201, Peoples R China
[2] Hunan Univ Sci & Technol, Hunan Prov Key Lab Geoinformat Engn Surveying Map, Xiangtan 411201, Peoples R China
[3] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[4] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
Digital copyright protection; TTP Watermarking protocol; Visual cryptography; Tripartite transaction model; Certification authority; Piracy tracing; Cryptosystem; PROTECTION; EFFICIENT; SCHEME;
D O I
10.1007/s11042-022-13002-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information technology, big data has had a positive impact on the development of various industries. All kinds of digital data trading platforms have been established accordingly. However, when the original data buyer illegally distributes the digital data that he has bought through the data trading platform, the copyright protection problem arises. Watermarking protocols designed for tracing illegal distributors when unauthorized copies are found provide good solutions for the above problem. Classic buyer-seller watermarking protocols are designed for two-party transaction models, not fit for the data trading platform-based tripartite transaction model. In this paper, the author proposes a TTP (Trusted Third Party) watermarking protocol based on visual cryptography for the tripartite transaction model. As far as we know, our proposed scheme is the first watermarking protocol for tripartite transaction models. Besides, by introducing computation-cheap visual cryptography, our scheme provides a good balance between some contradictory requirements, such as security versus efficiency. Through the security analysis, it can be found that the proposed scheme can solve the problems reported in the existing literatures and achieves several improvements over other schemes.
引用
收藏
页码:41079 / 41101
页数:23
相关论文
共 28 条
[1]   TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding [J].
Bianchi, Tiziano ;
Piva, Alessandro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1557-1568
[2]   An efficient and fair buyer-seller fingerprinting scheme for large scale networks [J].
Chang, Chin-Chen ;
Tsai, Hao-Chuan ;
Hsieh, Yi-Pei .
COMPUTERS & SECURITY, 2010, 29 (02) :269-277
[3]   Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol [J].
Chen, Tzung-Her ;
Tsai, Du-Shiau .
PATTERN RECOGNITION, 2006, 39 (08) :1530-1541
[4]  
Choi JG, 2003, LECT NOTES COMPUT SC, V2846, P265
[5]  
Cox I., 2001, Digital Watermarking
[6]  
Deng M., 2008, SECURE ANONYMOUS BUY, P524
[7]  
Deng M., P IEEE INT S ELECT C, V923, P929
[8]   Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content [J].
Eslami, Ziba ;
Kazemnasabhaji, Mohammad ;
Mirehi, Narges .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) :2723-2740
[9]   Blockchain-based authentication and authorization for smart city applications [J].
Esposito, Christian ;
Ficco, Massimo ;
Gupta, Brij Bhooshan .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (02)
[10]   Watermarking protocol for web context [J].
Frattolillo, Franco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) :350-363