1 October 2007 Watermarking protocol of secure verification
Author Affiliations +
The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permutations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbitration can be conducted without the need for the cooperation of the WCA or the buyer.
© (2007) Society of Photo-Optical Instrumentation Engineers (SPIE)
Jun Zhang, Jun Zhang, Weidong Kou, Weidong Kou, Kai Fan, Kai Fan, Lei Ye, Lei Ye, } "Watermarking protocol of secure verification," Journal of Electronic Imaging 16(4), 043002 (1 October 2007). https://doi.org/10.1117/1.2804233 . Submission:


The first BOWS contest (Break Our Watermarking System)
Proceedings of SPIE (February 26 2007)
New security system for ID certificates in IT society
Proceedings of SPIE (June 02 2004)
Nth-order audio watermarking
Proceedings of SPIE (April 28 2002)
An improved anti-leech mechanism based on session identifier
Proceedings of SPIE (January 13 2012)
New watermarking method using convex chain
Proceedings of SPIE (July 30 2002)

Back to Top