Skip to main content
Erschienen in: International Journal of Information Security 5/2018

05.07.2017 | Regular Contribution

Watermarking protocols: an excursus to motivate a new approach

verfasst von: Franco Frattolillo

Erschienen in: International Journal of Information Security | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital watermarking is one of the techniques that can be used to support digital copyright protection. It enables copyright owners to insert a perceptually invisible watermark within any copy of content that is distributed on the Internet. The main aim is to use watermarks to implement copyright identification and content tracking. However, digital watermarking is not sufficient to ensure an adequate copyright protection, if it is not employed in conjunction with watermarking protocols, which define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Therefore, watermarking protocols play a central role in the field of digital copyright protection by means of watermarking techniques. They have to ensure both a correct content protection and an easy participation of buyers in the purchase transactions of the contents distributed on the Internet. This paper presents a new watermarking protocol based on an innovative, buyer centric, and mediated design approach. The result is a secure protocol that enables buyers to easily participate in the transactions by which they can buy digital protected content, and this makes the protocol suited for the current web context.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007) Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)
2.
Zurück zum Zitat Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005)CrossRef Liu, K.J.R., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation, New York (2005)CrossRef
3.
Zurück zum Zitat Pehlivanoglu, S.: An asymmetric fingerprinting code for collusion-resistant buyer–seller watermarking. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, ACM, New York, NY, USA, 17–19 June 2013, pp. 35–44 Pehlivanoglu, S.: An asymmetric fingerprinting code for collusion-resistant buyer–seller watermarking. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, ACM, New York, NY, USA, 17–19 June 2013, pp. 35–44
4.
Zurück zum Zitat Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimed. 8(4), 66–70 (2001)CrossRef Gopalakrishnan, K., Memon, N., Vora, P.L.: Protocols for watermark verification. IEEE Multimed. 8(4), 66–70 (2001)CrossRef
5.
Zurück zum Zitat Kuribayashy, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)CrossRef Kuribayashy, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)CrossRef
6.
Zurück zum Zitat Frattolillo, F.: Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2(3), 350–363 (2007)CrossRef Frattolillo, F.: Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2(3), 350–363 (2007)CrossRef
7.
Zurück zum Zitat Frattolillo, F.: Watermarking protocols: problems, challenges and a possible solution. Comput. J. 58(4), 944–960 (2015)CrossRef Frattolillo, F.: Watermarking protocols: problems, challenges and a possible solution. Comput. J. 58(4), 944–960 (2015)CrossRef
8.
Zurück zum Zitat Memon, N., Wong, P.W.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)CrossRefMATH Memon, N., Wong, P.W.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)CrossRefMATH
9.
Zurück zum Zitat Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef
10.
Zurück zum Zitat Fan, C.I., Chen, M.T., Sun, W.Z.: Buyer–seller watermarking protocols with off-line trusted parties. In: Proceedings of the IEEE Internationla Conference on Multimedia and Ubiquitous Engineering, Seul, South Korea, IEEE Computer Society, Washington, DC, USA, 26–28 April 2007, pp. 1035–1040 Fan, C.I., Chen, M.T., Sun, W.Z.: Buyer–seller watermarking protocols with off-line trusted parties. In: Proceedings of the IEEE Internationla Conference on Multimedia and Ubiquitous Engineering, Seul, South Korea, IEEE Computer Society, Washington, DC, USA, 26–28 April 2007, pp. 1035–1040
11.
Zurück zum Zitat Das, V.V.: Buyer–seller watermarking protocol for an anonymous network transaction. In: Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, IEEE Computer Society, Washington, DC, USA, 16–18 July 2008, pp. 807–812 Das, V.V.: Buyer–seller watermarking protocol for an anonymous network transaction. In: Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, IEEE Computer Society, Washington, DC, USA, 16–18 July 2008, pp. 807–812
12.
Zurück zum Zitat Laxmi, V., Khan, M.N., Sarath, S., Gaur, M.S.: Buyer–seller watermarking protocol for digital rights management. In: Proceedings of the 2nd International Conference on Security of information and networks, Famagusta, North Cyprus, ACM, New York, NY, USA, 6–10 Oct 2009, pp. 298–301 Laxmi, V., Khan, M.N., Sarath, S., Gaur, M.S.: Buyer–seller watermarking protocol for digital rights management. In: Proceedings of the 2nd International Conference on Security of information and networks, Famagusta, North Cyprus, ACM, New York, NY, USA, 6–10 Oct 2009, pp. 298–301
13.
Zurück zum Zitat Hu, D., Li, Q.: A secure and practical buyer–seller watermarking protocol. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, IEEE Computer Society, Washington, DC, USA, 18–20 Nov 2009, pp. 105–108 Hu, D., Li, Q.: A secure and practical buyer–seller watermarking protocol. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Wuhan, China, IEEE Computer Society, Washington, DC, USA, 18–20 Nov 2009, pp. 105–108
14.
Zurück zum Zitat Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)CrossRef Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920–931 (2010)CrossRef
15.
Zurück zum Zitat Rial, A., Balasch, J., Preneel, B.: A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 6(1), 202–212 (2011)CrossRef Rial, A., Balasch, J., Preneel, B.: A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 6(1), 202–212 (2011)CrossRef
16.
Zurück zum Zitat Xu, Z., Li, L., Gao, H.: Bandwidth efficient buyer–seller watermarking protocol. Int. J. Inf. Comput. Secur. 5(1), 1–10 (2012) Xu, Z., Li, L., Gao, H.: Bandwidth efficient buyer–seller watermarking protocol. Int. J. Inf. Comput. Secur. 5(1), 1–10 (2012)
17.
Zurück zum Zitat Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)CrossRef Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)CrossRef
18.
Zurück zum Zitat Bianchi, T., Piva, A., Shullani, D.: Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6 (2015)CrossRef Bianchi, T., Piva, A., Shullani, D.: Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. EURASIP J. Inf. Secur. 2015, 6 (2015)CrossRef
19.
Zurück zum Zitat Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)CrossRef Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)CrossRef
20.
Zurück zum Zitat Zhao, H.V., Liu, K.J.R.: Traitor-within-traitor behavior forensics: strategy and risk minimization. IEEE Trans. Inf. Forensics Secur. 1(4), 440–456 (2006)CrossRef Zhao, H.V., Liu, K.J.R.: Traitor-within-traitor behavior forensics: strategy and risk minimization. IEEE Trans. Inf. Forensics Secur. 1(4), 440–456 (2006)CrossRef
21.
Zurück zum Zitat Frattolillo, F.: A buyer-friendly and mediated watermarking protocol for web context. ACM Trans. Web 10(2), 9 (2016)CrossRef Frattolillo, F.: A buyer-friendly and mediated watermarking protocol for web context. ACM Trans. Web 10(2), 9 (2016)CrossRef
22.
Zurück zum Zitat Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, Springer, Berlin, German, 5–8 June 2007, pp. 288–306 Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, Springer, Berlin, German, 5–8 June 2007, pp. 288–306
23.
Zurück zum Zitat Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In Cramer, R., ed.: Proc. 11th Int. Work. on Practice and Theory in Public-Key Cryptography. Volume 4939 of Lecture Notes in Computer Science., Barcelona, Spain, Springer, Berlin Heidelberg, German (March, 9–12 2008) 360–379 Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In Cramer, R., ed.: Proc. 11th Int. Work. on Practice and Theory in Public-Key Cryptography. Volume 4939 of Lecture Notes in Computer Science., Barcelona, Spain, Springer, Berlin Heidelberg, German (March, 9–12 2008) 360–379
24.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE Conference on Information communications, San Diego, CA, USA, IEEE Computer Society, Washington, DC, USA, 14–19 Mar 2010, pp. 534–542 Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE Conference on Information communications, San Diego, CA, USA, IEEE Computer Society, Washington, DC, USA, 14–19 Mar 2010, pp. 534–542
25.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, ACM, New York, NY, USA, 13–16 Apr 2010, pp. 261–270 Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, ACM, New York, NY, USA, 13–16 Apr 2010, pp. 261–270
26.
Zurück zum Zitat Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)CrossRef Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)CrossRef
27.
Zurück zum Zitat Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications, Shanghai, China, IEEE Computer Society, Washington, DC, USA, 10–15 Apr 2011, pp. 1952–1960 Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications, Shanghai, China, IEEE Computer Society, Washington, DC, USA, 10–15 Apr 2011, pp. 1952–1960
28.
Zurück zum Zitat Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007) Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007)
29.
Zurück zum Zitat Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proc. Inf. Secur. 153(1), 15–18 (2006)CrossRef Zhang, J., Kou, W., Fan, K.: Secure buyer–seller watermarking protocol. IEE Proc. Inf. Secur. 153(1), 15–18 (2006)CrossRef
30.
Zurück zum Zitat Deng, M., Preneel, B.: Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In: Proceedings of the IEEE International Symposium on Electronic Commerce and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 3–5 Aug 2008, pp. 923–929 Deng, M., Preneel, B.: Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In: Proceedings of the IEEE International Symposium on Electronic Commerce and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 3–5 Aug 2008, pp. 923–929
31.
Zurück zum Zitat Hu, Y., Zhang, J.: A secure and efficient buyer–seller watermarking protocol. J. Multimed. 4(3), 161–168 (2009) Hu, Y., Zhang, J.: A secure and efficient buyer–seller watermarking protocol. J. Multimed. 4(3), 161–168 (2009)
32.
Zurück zum Zitat Katzenbeisser, S., Lemma, A., Celik, M.U., van der Veen, M., Maas, M.: A buyer–seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)CrossRef Katzenbeisser, S., Lemma, A., Celik, M.U., van der Veen, M., Maas, M.: A buyer–seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)CrossRef
33.
Zurück zum Zitat Lemma, A.N., Katzenbeisser, S., Celik, M.U., v. d. Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds) Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 4283, Jeju Island, Korea, Springer, Berlin, Germany, 8–10 Nov 2006, pp. 433–445 Lemma, A.N., Katzenbeisser, S., Celik, M.U., v. d. Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds) Proceedings of the 5th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 4283, Jeju Island, Korea, Springer, Berlin, Germany, 8–10 Nov 2006, pp. 433–445
34.
Zurück zum Zitat Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)CrossRef Celik, M., Lemma, A., Katzenbeisser, S., van der Veen, M.: Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475–487 (2008)CrossRef
35.
Zurück zum Zitat Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Lecture Notes in Computer Science, vol. 2045, Innsbruck, Austria, Springer, Berlin Heidelberg, German, 6–10 May 2001, pp. 119–135 Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Lecture Notes in Computer Science, vol. 2045, Innsbruck, Austria, Springer, Berlin Heidelberg, German, 6–10 May 2001, pp. 119–135
36.
Zurück zum Zitat Wen, Q., Wang, Y.: Improvement of the digital watermarking protocol based on the zero-watermark method. In: Proceedings of the 3rd Annual Summit and Conference of Asia Pacific Signal and Information Processing Association, Xi’an, China, PSIPA publisher, 19–21 Oct 2011 Wen, Q., Wang, Y.: Improvement of the digital watermarking protocol based on the zero-watermark method. In: Proceedings of the 3rd Annual Summit and Conference of Asia Pacific Signal and Information Processing Association, Xi’an, China, PSIPA publisher, 19–21 Oct 2011
37.
Zurück zum Zitat Cox, I., Kilian, J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Signal Process. 6(12), 1673–1687 (1997) Cox, I., Kilian, J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Signal Process. 6(12), 1673–1687 (1997)
38.
Zurück zum Zitat Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete algorithms, Washington, DC, USA, 7–9 Jan 2001, pp. 448–457 Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete algorithms, Washington, DC, USA, 7–9 Jan 2001, pp. 448–457
39.
Zurück zum Zitat Terelius, B.: Towards transferable watermarks in buyer–seller watermarking protocols. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 18–21 Nov 2013, pp. 197–202 Terelius, B.: Towards transferable watermarks in buyer–seller watermarking protocols. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Guangzhou, China, IEEE Computer Society, Washington, DC, USA, 18–21 Nov 2013, pp. 197–202
40.
Zurück zum Zitat Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, ACM, New York, NY, USA, 9–11 June 2003, pp. 116–125 Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, San Diego, CA, USA, ACM, New York, NY, USA, 9–11 June 2003, pp. 116–125
41.
Zurück zum Zitat Huang, J.C., Jeng, F.G., Chen, T.H.: A new buyer–seller watermarking protocol without multiple watermarks insertion. Multimed. Tools Appl. 75(33), 1–13 (2016) Huang, J.C., Jeng, F.G., Chen, T.H.: A new buyer–seller watermarking protocol without multiple watermarks insertion. Multimed. Tools Appl. 75(33), 1–13 (2016)
42.
Zurück zum Zitat Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Eurocrypt ‘94. Lecture Notes in Computer Science, vol. 950, Perugia, Italy, Springer, Berlin, Heidelberg, May 1995, pp. 1–12 Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of the Eurocrypt ‘94. Lecture Notes in Computer Science, vol. 950, Perugia, Italy, Springer, Berlin, Heidelberg, May 1995, pp. 1–12
43.
Zurück zum Zitat Deng, M., Preneel, B.: On secure and anonymous buyer–seller watermarking protocol. In: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 8–13 June 2008, pp. 524–529 Deng, M., Preneel, B.: On secure and anonymous buyer–seller watermarking protocol. In: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 8–13 June 2008, pp. 524–529
44.
Zurück zum Zitat Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, ACM, New York, NY, USA, 7–8 Sept 2009, pp. 9–18 Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer–seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, ACM, New York, NY, USA, 7–8 Sept 2009, pp. 9–18
45.
Zurück zum Zitat Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH
46.
Zurück zum Zitat Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, The USENIX Association, 13–17 Aug 2001, pp. 297–308 Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, The USENIX Association, 13–17 Aug 2001, pp. 297–308
47.
Zurück zum Zitat Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated RSA. In: Joye, M. (ed.) The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, vol. 2612 , San Francisco, CA, USA, Springer, Berlin, Germany, 13–17 Apr 2003, pp. 193–210 Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated RSA. In: Joye, M. (ed.) The Cryptographers’ Track at the RSA Conference 2003. Lecture Notes in Computer Science, vol. 2612 , San Francisco, CA, USA, Springer, Berlin, Germany, 13–17 Apr 2003, pp. 193–210
48.
Zurück zum Zitat Poh, G.S., Martin, K.M.: Classification framework for fair content tracing protocols. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5703, Guildford, UK, Springer, Berlin, Germany, 24–26 Aug 2009, pp. 252–267 Poh, G.S., Martin, K.M.: Classification framework for fair content tracing protocols. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Proceedings of the 8th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5703, Guildford, UK, Springer, Berlin, Germany, 24–26 Aug 2009, pp. 252–267
49.
Zurück zum Zitat Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999) Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999)
50.
Zurück zum Zitat Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 9(9), 194–210 (1998)CrossRef Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 9(9), 194–210 (1998)CrossRef
51.
Zurück zum Zitat Rannenberg, K., Royer, D., Deuker, A.: The Future of Identity in the Information Society—Challenges and Opportunities. Springer, Berlin (2009)CrossRef Rannenberg, K., Royer, D., Deuker, A.: The Future of Identity in the Information Society—Challenges and Opportunities. Springer, Berlin (2009)CrossRef
52.
Zurück zum Zitat Williams, D.M., Treharne, H., Ho, A.T.S.: On the importance of one-time key pairs in buyer–seller watermarking protocols. In: Proceedings of the International Conference on Security and Cryptography, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 26–28 July 2010, pp. 441–446 Williams, D.M., Treharne, H., Ho, A.T.S.: On the importance of one-time key pairs in buyer–seller watermarking protocols. In: Proceedings of the International Conference on Security and Cryptography, Athens, Greece, IEEE Computer Society, Washington, DC, USA, 26–28 July 2010, pp. 441–446
53.
Zurück zum Zitat Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, vol. 740, Santa Barbara, CA, USA, Springer, Berlin, Germany, 16–20 Aug 1992, pp. 390–420 Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, vol. 740, Santa Barbara, CA, USA, Springer, Berlin, Germany, 16–20 Aug 1992, pp. 390–420
54.
Zurück zum Zitat Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH, Zurich, Switzerland (March 1997) Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH, Zurich, Switzerland (March 1997)
55.
Zurück zum Zitat Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1992, Cheju Island, Korea, Springer, Berlin, Germany, 13–15 Feb 2001, pp. 119–136 Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1992, Cheju Island, Korea, Springer, Berlin, Germany, 13–15 Feb 2001, pp. 119–136
56.
Zurück zum Zitat Canetti, R.: Security and composition of cryptographic protocols: a tutorial. Cryptology ePrint Archive, Report 2006/465 (2006) Canetti, R.: Security and composition of cryptographic protocols: a tutorial. Cryptology ePrint Archive, Report 2006/465 (2006)
57.
Zurück zum Zitat Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents, Proceedings of the SPIE, vol. 3657, San Jose, CA, USA, SPIE, Bellingham WA, USA, 9 Apr 1999, pp. 147–158 Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents, Proceedings of the SPIE, vol. 3657, San Jose, CA, USA, SPIE, Bellingham WA, USA, 9 Apr 1999, pp. 147–158
58.
Zurück zum Zitat Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, Proceedings of the SPIE, vol. 4675 S. Jose, CA, USA, SPIE, Bellingham WA, USA, 29 Apr 2002, pp. 260–268 Katzenbeisser, S., Veith, H.: Securing symmetric watermarking schemes against protocol attacks. In: Delp, E.J., Wong, P.W. (eds.) Security and Watermarking of Multimedia Contents IV, Proceedings of the SPIE, vol. 4675 S. Jose, CA, USA, SPIE, Bellingham WA, USA, 29 Apr 2002, pp. 260–268
59.
Zurück zum Zitat Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)CrossRef Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)CrossRef
60.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Eurocrypt ‘99. Lecture Notes in Computer Science, vol. 1592, Prague, Czech Republic, Springer, Berlin, Heidelberg, 2–6 May 1999, pp. 223–238 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Eurocrypt ‘99. Lecture Notes in Computer Science, vol. 1592, Prague, Czech Republic, Springer, Berlin, Heidelberg, 2–6 May 1999, pp. 223–238
61.
Zurück zum Zitat Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, vol. 4004, Saint Petersburg, Russia, Springer, Berlin, Germany, 28 May–1 June 2006, pp. 409–426 Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Proceedings of the 25th International Cryptology Conference. Lecture Notes in Computer Science, vol. 4004, Saint Petersburg, Russia, Springer, Berlin, Germany, 28 May–1 June 2006, pp. 409–426
62.
Zurück zum Zitat Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A.: Formal analysis of two buyer–seller watermarking protocols. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5450, Busan, Korea, Springer, Berlin, Germany, 10–12 Nov 2008, pp. 278–292 Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A.: Formal analysis of two buyer–seller watermarking protocols. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) Proceedings of the 7th International Workshop on Digital Watermarking. Lecture Notes in Computer Science, vol. 5450, Busan, Korea, Springer, Berlin, Germany, 10–12 Nov 2008, pp. 278–292
Metadaten
Titel
Watermarking protocols: an excursus to motivate a new approach
verfasst von
Franco Frattolillo
Publikationsdatum
05.07.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 5/2018
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-017-0386-9

Weitere Artikel der Ausgabe 5/2018

International Journal of Information Security 5/2018 Zur Ausgabe

Premium Partner