Skip to main content
Top
Published in: International Journal of Information Security 5/2018

05-07-2017 | Regular Contribution

Watermarking protocols: an excursus to motivate a new approach

Author: Franco Frattolillo

Published in: International Journal of Information Security | Issue 5/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital watermarking is one of the techniques that can be used to support digital copyright protection. It enables copyright owners to insert a perceptually invisible watermark within any copy of content that is distributed on the Internet. The main aim is to use watermarks to implement copyright identification and content tracking. However, digital watermarking is not sufficient to ensure an adequate copyright protection, if it is not employed in conjunction with watermarking protocols, which define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Therefore, watermarking protocols play a central role in the field of digital copyright protection by means of watermarking techniques. They have to ensure both a correct content protection and an easy participation of buyers in the purchase transactions of the contents distributed on the Internet. This paper presents a new watermarking protocol based on an innovative, buyer centric, and mediated design approach. The result is a secure protocol that enables buyers to easily participate in the transactions by which they can buy digital protected content, and this makes the protocol suited for the current web context.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007) Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)
2.
go back to reference Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005)CrossRef Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005)CrossRef
3.
go back to reference Pehlivanoglu, S.: An asymmetric fingerprinting code for collusion-resistant buyer–seller watermarking. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, ACM, New York, NY, USA, 17–19 June 2013, pp. 35–44 Pehlivanoglu, S.: An asymmetric fingerprinting code for collusion-resistant buyer–seller watermarking. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, ACM, New York, NY, USA, 17–19 June 2013, pp. 35–44
4.
go back to reference Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimed. 8(4), 66–70 (2001)CrossRef Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimed. 8(4), 66–70 (2001)CrossRef
5.
go back to reference Kuribayashy, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)CrossRef Kuribayashy, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)CrossRef
6.
go back to reference Frattolillo, F.: Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2(3), 350–363 (2007)CrossRef Frattolillo, F.: Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2(3), 350–363 (2007)CrossRef
7.
go back to reference Frattolillo, F.: Watermarking protocols: problems, challenges and a possible solution. Comput. J. 58(4), 944–960 (2015)CrossRef Frattolillo, F.: Watermarking protocols: problems, challenges and a possible solution. Comput. J. 58(4), 944–960 (2015)CrossRef
8.
go back to reference Memon, N., Wong, P.W.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)CrossRefMATH Memon, N., Wong, P.W.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)CrossRefMATH
9.
go back to reference Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef
10.
go back to reference Fan, C.I., Chen, M.T., Sun, W.Z.: Buyer–seller watermarking protocols with off-line trusted parties. In: Proceedings of the IEEE Internationla Conference on Multimedia and Ubiquitous Engineering, Seul, South Korea, IEEE Computer Society, Washington, DC, USA, 26–28 April 2007, pp. 1035–1040 Fan, C.I., Chen, M.T., Sun, W.Z.: Buyer–seller watermarking protocols with off-line trusted parties. In: Proceedings of the IEEE Internationla Conference on Multimedia and Ubiquitous Engineering, Seul, South Korea, IEEE Computer Society, Washington, DC, USA, 26–28 April 2007, pp. 1035–1040
11.
go back to reference Das, V.V.: Buyer–seller watermarking protocol for an anonymous network transaction. In: Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, IEEE Computer Society, Washington, DC, USA, 16–18 July 2008, pp. 807–812 Das, V.V.: Buyer–seller watermarking protocol for an anonymous network transaction. In: Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, IEEE Computer Society, Washington, DC, USA, 16–18 July 2008, pp. 807–812
12.
go back to reference Laxmi, V., Khan, M.N., Sarath, S., Gaur, M.S.: Buyer–seller watermarking protocol for digital rights management. In: Proceedings of the 2nd International Conference on Security of information and networks, Famagusta, North Cyprus, ACM, New York, NY, USA, 6–10 Oct 2009, pp. 298–301 Laxmi, V., Khan, M.N., Sarath, S., Gaur, M.S.: Buyer–seller watermarking protocol for digital rights management. In: Proceedings of the 2nd International Conference on Security of information and networks, Famagusta, North Cyprus, ACM, New York, NY, USA, 6–10 Oct 2009, pp. 298–301
13.
go back to reference Hu, D., Li, Q.: A secure and practical buyer–seller watermarking protocol. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, IEEE Computer Society, Washington, DC, USA, 18–20 Nov 2009, pp. 105–108 Hu, D., Li, Q.: A secure and practical buyer–seller watermarking protocol. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, IEEE Computer Society, Washington, DC, USA, 18–20 Nov 2009, pp. 105–108
14.
go back to reference Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)CrossRef Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)CrossRef
15.
go back to reference Rial, A., Balasch, J., Preneel, B.: A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 6(1), 202–212 (2011)CrossRef Rial, A., Balasch, J., Preneel, B.: A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 6(1), 202–212 (2011)CrossRef
16.
go back to reference Xu, Z., Li, L., Gao, H.: Bandwidth efficient buyer–seller watermarking protocol. Int. J. Inf. Comput. Secur. 5(1), 1–10 (2012) Xu, Z., Li, L., Gao, H.: Bandwidth efficient buyer–seller watermarking protocol. Int. J. Inf. Comput. Secur. 5(1), 1–10 (2012)
17.
go back to reference Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)CrossRef Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)CrossRef
18.
go back to reference Bianchi, T., Piva, A., Shullani, D.: Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6 (2015)CrossRef Bianchi, T., Piva, A., Shullani, D.: Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6 (2015)CrossRef
19.
go back to reference Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)CrossRef Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)CrossRef
20.
go back to reference Zhao, H.V., Liu, K.J.R.: Traitor-within-traitor behavior forensics: strategy and risk minimization. IEEE Trans. Inf. Forensics Secur. 1(4), 440–456 (2006)CrossRef Zhao, H.V., Liu, K.J.R.: Traitor-within-traitor behavior forensics: strategy and risk minimization. IEEE Trans. Inf. Forensics Secur. 1(4), 440–456 (2006)CrossRef
21.
go back to reference Frattolillo, F.: A buyer-friendly and mediated watermarking protocol for web context. ACM Trans. Web 10(2), 9 (2016)CrossRef Frattolillo, F.: A buyer-friendly and mediated watermarking protocol for web context. ACM Trans. Web 10(2), 9 (2016)CrossRef
22.
go back to reference Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, Springer, Berlin, German, 5–8 June 2007, pp. 288–306 Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, Springer, Berlin, German, 5–8 June 2007, pp. 288–306
23.
go back to reference Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In Cramer, R., ed.: Proc. 11th Int. Work. on Practice and Theory in Public-Key Cryptography. Volume 4939 of Lecture Notes in Computer Science., Barcelona, Spain, Springer, Berlin Heidelberg, German (March, 9–12 2008) 360–379 Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In Cramer, R., ed.: Proc. 11th Int. Work. on Practice and Theory in Public-Key Cryptography. Volume 4939 of Lecture Notes in Computer Science., Barcelona, Spain, Springer, Berlin Heidelberg, German (March, 9–12 2008) 360–379
24.
go back to reference Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE Conference on Information communications, San Diego, CA, USA, IEEE Computer Society, Washington, DC, USA, 14–19 Mar 2010, pp. 534–542 Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE Conference on Information communications, San Diego, CA, USA, IEEE Computer Society, Washington, DC, USA, 14–19 Mar 2010, pp. 534–542
25.
go back to reference Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, ACM, New York, NY, USA, 13–16 Apr 2010, pp. 261–270 Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, ACM, New York, NY, USA, 13–16 Apr 2010, pp. 261–270
26.
go back to reference Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)CrossRef Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)CrossRef
27.
go back to reference Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications, Shanghai, China, IEEE Computer Society, Washington, DC, USA, 10–15 Apr 2011, pp. 1952–1960 Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications, Shanghai, China, IEEE Computer Society, Washington, DC, USA, 10–15 Apr 2011, pp. 1952–1960
28.
go back to reference Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007) Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007)
29.
go back to reference Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proc. Inf. Secur. 153(1), 15–18 (2006)CrossRef Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proc. Inf. Secur. 153(1), 15–18 (2006)CrossRef
30.
go back to reference Deng, M., Preneel, B.: Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In: Proceedings of the IEEE International Symposium on Electronic Commerce and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 3–5 Aug 2008, pp. 923–929 Deng, M., Preneel, B.: Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In: Proceedings of the IEEE International Symposium on Electronic Commerce and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 3–5 Aug 2008, pp. 923–929
31.
go back to reference Hu, Y., Zhang, J.: A secure and efficient buyer–seller watermarking protocol. J. Multimed. 4(3), 161–168 (2009) Hu, Y., Zhang, J.: A secure and efficient buyer–seller watermarking protocol. J. Multimed. 4(3), 161–168 (2009)
32.
go back to reference Katzenbeisser, S., Lemma, A., Celik, M.U., van der Veen, M., Maas, M.: A buyer–seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)CrossRef Katzenbeisser, S., Lemma, A., Celik, M.U., van der Veen, M., Maas, M.: A buyer–seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)CrossRef
33.
go back to reference Lemma, A.N., Katzenbeisser, S., Celik, M.U., v. d. Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds) Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 4283, Jeju Island, Korea, Springer, Berlin, Germany, 8–10 Nov 2006, pp. 433–445 Lemma, A.N., Katzenbeisser, S., Celik, M.U., v. d. Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds) Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 4283, Jeju Island, Korea, Springer, Berlin, Germany, 8–10 Nov 2006, pp. 433–445
34.
go back to reference Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)CrossRef Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)CrossRef
35.
go back to reference Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Lecture Notes in Computer Science, vol. 2045, Innsbruck, Austria, Springer, Berlin Heidelberg, German, 6–10 May 2001, pp. 119–135 Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Lecture Notes in Computer Science, vol. 2045, Innsbruck, Austria, Springer, Berlin Heidelberg, German, 6–10 May 2001, pp. 119–135
36.
go back to reference Wen, Q., Wang, Y.: Improvement of the digital watermarking protocol based on the zero-watermark method. In: Proceedings of the 3rd Annual Summit and Conference of Asia Pacific Signal and Information Processing Association, Xi’an, China, PSIPA publisher, 19–21 Oct 2011 Wen, Q., Wang, Y.: Improvement of the digital watermarking protocol based on the zero-watermark method. In: Proceedings of the 3rd Annual Summit and Conference of Asia Pacific Signal and Information Processing Association, Xi’an, China, PSIPA publisher, 19–21 Oct 2011
37.
go back to reference Cox, I., Kilian, J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Signal Process. 6(12), 1673–1687 (1997) Cox, I., Kilian, J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Signal Process. 6(12), 1673–1687 (1997)
38.
go back to reference Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete algorithms, Washington, DC, USA, 7–9 Jan 2001, pp. 448–457 Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete algorithms, Washington, DC, USA, 7–9 Jan 2001, pp. 448–457
39.
go back to reference Terelius, B.: Towards transferable watermarks in buyer–seller watermarking protocols. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 18–21 Nov 2013, pp. 197–202 Terelius, B.: Towards transferable watermarks in buyer–seller watermarking protocols. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 18–21 Nov 2013, pp. 197–202
40.
go back to reference Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, ACM, New York, NY, USA, 9–11 June 2003, pp. 116–125 Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, ACM, New York, NY, USA, 9–11 June 2003, pp. 116–125
41.
go back to reference Huang, J.C., Jeng, F.G., Chen, T.H.: A new buyer–seller watermarking protocol without multiple watermarks insertion. Multimed. Tools Appl. 75(33), 1–13 (2016) Huang, J.C., Jeng, F.G., Chen, T.H.: A new buyer–seller watermarking protocol without multiple watermarks insertion. Multimed. Tools Appl. 75(33), 1–13 (2016)
42.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Eurocrypt ‘94. Lecture Notes in Computer Science, vol. 950, Perugia, Italy, Springer, Berlin, Heidelberg, May 1995, pp. 1–12 Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Eurocrypt ‘94. Lecture Notes in Computer Science, vol. 950, Perugia, Italy, Springer, Berlin, Heidelberg, May 1995, pp. 1–12
43.
go back to reference Deng, M., Preneel, B.: On secure and anonymous buyer–seller watermarking protocol. In: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 8–13 June 2008, pp. 524–529 Deng, M., Preneel, B.: On secure and anonymous buyer–seller watermarking protocol. In: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 8–13 June 2008, pp. 524–529
44.
go back to reference Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, ACM, New York, NY, USA, 7–8 Sept 2009, pp. 9–18 Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, ACM, New York, NY, USA, 7–8 Sept 2009, pp. 9–18
45.
go back to reference Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH
46.
go back to reference Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, The USENIX Association, 13–17 Aug 2001, pp. 297–308 Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, The USENIX Association, 13–17 Aug 2001, pp. 297–308
47.
go back to reference Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated RSA. In: Joye, M. (ed.) The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, vol. 2612 , San Francisco, CA, USA, Springer, Berlin, Germany, 13–17 Apr 2003, pp. 193–210 Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated RSA. In: Joye, M. (ed.) The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, vol. 2612 , San Francisco, CA, USA, Springer, Berlin, Germany, 13–17 Apr 2003, pp. 193–210
48.
go back to reference Poh, G.S., Martin, K.M.: Classification framework for fair content tracing protocols. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5703, Guildford, UK, Springer, Berlin, Germany, 24–26 Aug 2009, pp. 252–267 Poh, G.S., Martin, K.M.: Classification framework for fair content tracing protocols. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5703, Guildford, UK, Springer, Berlin, Germany, 24–26 Aug 2009, pp. 252–267
49.
go back to reference Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999) Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999)
50.
go back to reference Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 9(9), 194–210 (1998)CrossRef Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 9(9), 194–210 (1998)CrossRef
51.
go back to reference Rannenberg, K., Royer, D., Deuker, A.: The Future of Identity in the Information Society—Challenges and Opportunities. Springer, Berlin (2009)CrossRef Rannenberg, K., Royer, D., Deuker, A.: The Future of Identity in the Information Society—Challenges and Opportunities. Springer, Berlin (2009)CrossRef
52.
go back to reference Williams, D.M., Treharne, H., Ho, A.T.S.: On the importance of one-time key pairs in buyer–seller watermarking protocols. In: Proceedings of the International Conference on Security and Cryptography, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 26–28 July 2010, pp. 441–446 Williams, D.M., Treharne, H., Ho, A.T.S.: On the importance of one-time key pairs in buyer–seller watermarking protocols. In: Proceedings of the International Conference on Security and Cryptography, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 26–28 July 2010, pp. 441–446
53.
go back to reference Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, vol. 740, Santa Barbara, CA, USA, Springer, Berlin, Germany, 16–20 Aug 1992, pp. 390–420 Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, vol. 740, Santa Barbara, CA, USA, Springer, Berlin, Germany, 16–20 Aug 1992, pp. 390–420
54.
go back to reference Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH, Zurich, Switzerland (March 1997) Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH, Zurich, Switzerland (March 1997)
55.
go back to reference Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1992, Cheju Island, Korea, Springer, Berlin, Germany, 13–15 Feb 2001, pp. 119–136 Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1992, Cheju Island, Korea, Springer, Berlin, Germany, 13–15 Feb 2001, pp. 119–136
56.
go back to reference Canetti, R.: Security and composition of cryptographic protocols: a tutorial. Cryptology ePrint Archive, Report 2006/465 (2006) Canetti, R.: Security and composition of cryptographic protocols: a tutorial. Cryptology ePrint Archive, Report 2006/465 (2006)
57.
go back to reference Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents, Proceedings of the SPIE, vol. 3657, San Jose, CA, USA, SPIE, Bellingham WA, USA, 9 Apr 1999, pp. 147–158 Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents, Proceedings of the SPIE, vol. 3657, San Jose, CA, USA, SPIE, Bellingham WA, USA, 9 Apr 1999, pp. 147–158
58.
go back to reference Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, Proceedings of the SPIE, vol. 4675 S. Jose, CA, USA, SPIE, Bellingham WA, USA, 29 Apr 2002, pp. 260–268 Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, Proceedings of the SPIE, vol. 4675 S. Jose, CA, USA, SPIE, Bellingham WA, USA, 29 Apr 2002, pp. 260–268
59.
go back to reference Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)CrossRef Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)CrossRef
60.
go back to reference Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Eurocrypt ‘99. Lecture Notes in Computer Science, vol. 1592, Prague, Czech Republic, Springer, Berlin, Heidelberg, 2–6 May 1999, pp. 223–238 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Eurocrypt ‘99. Lecture Notes in Computer Science, vol. 1592, Prague, Czech Republic, Springer, Berlin, Heidelberg, 2–6 May 1999, pp. 223–238
61.
go back to reference Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, vol. 4004, Saint Petersburg, Russia, Springer, Berlin, Germany, 28 May–1 June 2006, pp. 409–426 Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, vol. 4004, Saint Petersburg, Russia, Springer, Berlin, Germany, 28 May–1 June 2006, pp. 409–426
62.
go back to reference Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A.: Formal analysis of two buyer–seller watermarking protocols. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5450, Busan, Korea, Springer, Berlin, Germany, 10–12 Nov 2008, pp. 278–292 Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A.: Formal analysis of two buyer–seller watermarking protocols. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5450, Busan, Korea, Springer, Berlin, Germany, 10–12 Nov 2008, pp. 278–292
Metadata
Title
Watermarking protocols: an excursus to motivate a new approach
Author
Franco Frattolillo
Publication date
05-07-2017
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 5/2018
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-017-0386-9

Other articles of this Issue 5/2018

International Journal of Information Security 5/2018 Go to the issue

Premium Partner