skip to main content
10.1145/1411328.1411363acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol

Published: 22 September 2008 Publication History

Abstract

In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing a model using the process algebra CSP. By describing our model in this manner and utilising the tool support associated with CSP we are able to conduct a thorough analysis of all the possible behaviour in the protocol. Through formal analysis we have discovered an unbinding attack on the protocol. In this paper we also highlight other weaknesses that exist in the protocol and propose verifiable solutions to correct these weaknesses.

References

[1]
C.-C. Chang and C.-. Chung. An enhanced buyer seller watermarking protocol. In International Conference on Communication Technology Proceedings, pages 1779--1783, 2003.
[2]
I. J. Cox, L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann, 2002.
[3]
S. Craver, N. Memon, B. L. Yeo, and M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573--586, 1998.
[4]
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198--208, 1983.
[5]
C. A. R. Hoare. Communicating sequential processes. Prentice-Hall International, 1985.
[6]
I. M. Ibrahim, S. H. N. El-Din, and A. F. A. Hegazy. An effective and secure buyer seller watermarking protocol. In Third International Symposium on Information Assurance and Security, pages 21--28, 2007.
[7]
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618--1626, 2004.
[8]
G. Lowe. Breaking and fixing the needham-schroeder public-key protocol using fdr. In Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147--166, 1996.
[9]
N. Memon and P. W. Wong. A buyer seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643--649, 2001.
[10]
L. Qiao and K. Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customers' rights. Journal of Visual Communication and Image Representation, 9(3):194--210, 1998.
[11]
A. W. Roscoe. The theory and practice of concurrency. Prentice Hall, 1998.
[12]
A. W. Roscoe, P. Ryan, S. Schneider, M. Goldsmith, and G. Lowe. The Modelling and Analysis of Security Protocols. Addison-Wesley, 2001.
[13]
F. Systems. FDR 2.82. Formal Systems Ltd., 2005.
[14]
J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. IEE Proceedings Information Security, 153(1):15--18, 2006.

Cited By

View all
  • (2011)Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital ContentsWireless Personal Communications: An International Journal10.1007/s11277-009-9876-z56:1(73-83)Online publication date: 1-Jan-2011

Index Terms

  1. Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
      September 2008
      242 pages
      ISBN:9781605580586
      DOI:10.1145/1411328
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 September 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. buyer-seller watermarking protocol
      2. csp
      3. customer's rights
      4. formal analysis
      5. formal model
      6. unbinding

      Qualifiers

      • Research-article

      Conference

      MM&Sec '08
      Sponsor:
      MM&Sec '08: Multimedia and Security Workshop
      September 22 - 23, 2008
      Oxford, United Kingdom

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2011)Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital ContentsWireless Personal Communications: An International Journal10.1007/s11277-009-9876-z56:1(73-83)Online publication date: 1-Jan-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media