ABSTRACT
In today's digital age, e-commerce is emerging as an alternative and inexpensive solution to traditional selling of products through shops. Sale of electronic data such as software, audio/video data, books etc. poses a problem as digital data can be easily replicated, modified and distributed. Watermarks were introduced as a means to establish ownership of digital data and check unauthorized reuse and/or violation of copyrighted material. A good e-distribution system should be able to protect rights of both buyer and seller; ensure secure and confidential transactions; determine correct source of unauthorized copies. In this paper, we propose a framework for e-distribution of digital rights. This system is based on a trusted third party CA (Certification Authority) and uses PKI (public key infrastructure). Proposed system address problems of customer's check, copy detection, customers right,unbinding, non-repudiation and man in the middle attack.
- Lei C.-L., Yu P.-L., Tsai P.-L., and Chan M.-H. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618--1626, 2004. Google ScholarDigital Library
- P. Mandal, A. Thakral, and S. Verma. Watermark based digital rights management. In ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) -- Volume II, pages 74--78, Washington, DC, USA, April 4-6 2005. IEEE Computer Society. Google ScholarDigital Library
- N. Memon and P.W. Wong. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643--649, 2001. Google ScholarDigital Library
- L. Qiao and K. Nahrstedlt. Watermarking schemes and protocols for protecting rightful ownership and customer's right. Journal of Visual Communication and Image Representation, 9:194--210, 1998.Google ScholarDigital Library
Index Terms
- Buyer seller watermarking protocol for digital rights management
Recommendations
An enhanced secure buyer-seller watermarking protocol
ICAC3 '09: Proceedings of the International Conference on Advances in Computing, Communication and ControlDigital watermarks are used to prevent unauthorized duplication and distribution of multimedia contents. This is achieved by inserting a unique digital watermark into each copy of the multimedia contents before it is sold to a buyer. If the buyer sells ...
A Buyer–Seller Watermarking Protocol Based on Secure Embedding
In a forensic watermarking architecture, a buyer-seller protocol protects the watermark secrets from the buyer and prevents false infringement accusations by the seller. Existing protocols encrypt the watermark and the content with a homomorphic public-...
A buyer-seller watermarking protocol
Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a ...
Comments