1 October 2007 Watermarking protocol of secure verification
Author Affiliations +
J. of Electronic Imaging, 16(4), 043002 (2007). doi:10.1117/1.2804233
Abstract
The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permutations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbitration can be conducted without the need for the cooperation of the WCA or the buyer.
Jun Zhang, Weidong Kou, Kai Fan, Lei Ye, "Watermarking protocol of secure verification," Journal of Electronic Imaging 16(4), 043002 (1 October 2007). https://doi.org/10.1117/1.2804233
JOURNAL ARTICLE
4 PAGES


SHARE
RELATED CONTENT

The first BOWS contest (Break Our Watermarking System)
Proceedings of SPIE (February 27 2007)
New security system for ID certificates in IT society
Proceedings of SPIE (June 03 2004)
Nth-order audio watermarking
Proceedings of SPIE (April 29 2002)
An improved anti-leech mechanism based on session identifier
Proceedings of SPIE (January 13 2012)
New watermarking method using convex chain
Proceedings of SPIE (July 31 2002)

Back to Top