9 April 1999 Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System
Author Affiliations +
Proceedings Volume 3657, Security and Watermarking of Multimedia Contents; (1999); doi: 10.1117/12.344679
Event: Electronic Imaging '99, 1999, San Jose, CA, United States
Abstract
Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.
© (1999) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Nasir D. Memon, Ping Wah Wong, "Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System", Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, (9 April 1999); doi: 10.1117/12.344679; https://doi.org/10.1117/12.344679
PROCEEDINGS
6 PAGES


SHARE
KEYWORDS
Digital watermarking

Image encryption

Amplitude modulation

Electroluminescence

Multimedia

Computer security

Detection and tracking algorithms

Back to Top