skip to main content
10.1145/1597817.1597820acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

An efficient buyer-seller watermarking protocol based on composite signal representation

Published:07 September 2009Publication History

ABSTRACT

Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal representation in the encrypted domain. A recently proposed composite signal representation allows us to reduce both the computational overhead and the large communication bandwidth which are due to the use of homomorphic public-key encryption schemes. Both complexity analysis and simulation results confirm the efficiency of the proposed solution, suggesting that this technique can be successfully used in practical applications.

References

  1. M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136--153, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Bianchi, A. Piva, and M. Barni. Efficient pointwise and blockwise encrypted operations. In Proc. of ACM Multimedia&Security Workshop 2008, pages 85--90, Oxford, UK, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415--428, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In proceedings of SCN'04, pages 120--133, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Adv. in Cryptology - EUROCRYPT 1999, LNCS 1592, pages 106--121, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Adv. in Cryptology - CRYPTO 2003, LNCS 2729, pages 126--144, 2003.Google ScholarGoogle Scholar
  7. B. Chen and G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4):1423--1443, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. J. Cox, M. L. Miller, and A. L. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, 87(7):1127--1141, July 1999.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Cramer, I. Damgard, and P. Mackenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography, volume 1751 of LNCS, pages 354--372, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573--586, 1998. Google ScholarGoogle ScholarCross RefCross Ref
  11. I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119--136, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Deng, L. Weng, and B. Preneel. Anonymous buyer-seller watermarking protocol with additive homomorphism. In Proc. of International Conference on Signal Processing and Multimedia Applications, page 11, 2008.Google ScholarGoogle Scholar
  13. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Adv. in Cryptology - CRYPTO 84, LNCS 196, pages 10--18, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, Article ID 78943, 20 pages, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Gennaro, D. Micciancio, and T. Rabin. An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products. In 5th ACM Conference on Computer and Communication Security (CCS'98), pages 67--72, San Francisco, CA, Nov. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas. A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. on Information Forensics and Security, 3(4):783--786, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Kuribayashi and H. Tanaka. Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. on Image Processing, 14(12):2129--2139, Dec. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing, 13(12):1618--1626, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. D. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEE Trans. on Image Proc., 10(4):643--649, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Moulin and R. Koetter. Data-hiding codes. Proceedings of the IEEE, 93(12):2083--2126, Dec. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  21. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Adv. in Cryptology - EUROCRYPT'99, LNCS 1592, pages 223--238, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. on Signal Processing, 53(10):3960--3975, Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Pfitzmann and A.-R. Sadeghi. Anonymous fingerprinting with direct non-repudiation. In Adv. in Cryptology - ASIACRYPT '00, LNCS 1976, pages 401--414, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Pittzmann and M. Schunter. Asymmetric fingerprinting. In Adv. in Cryptology - EUROCRYPT'96, LNCS 1070, pages 84--95, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. Poupard and J. Stern. Fair encryption of RSA keys. In Adv. in Cryptology - EUROCRYPT'00, LNCS 1807, pages 172--190, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. P. Prins, Z. Erkin, and R. L. Lagendijk. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security, 2007, Article ID 31340, 13 pages, 2007.Google ScholarGoogle Scholar

Index Terms

  1. An efficient buyer-seller watermarking protocol based on composite signal representation

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security
                September 2009
                186 pages
                ISBN:9781605584928
                DOI:10.1145/1597817

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 7 September 2009

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate128of318submissions,40%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader