Watermarking protocol of secure verification
Author(s) -
Jun Zhang,
Weidong Kou,
Kai Fan,
Lei Ye
Publication year - 2007
Publication title -
journal of electronic imaging
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.238
H-Index - 66
eISSN - 1560-229X
pISSN - 1017-9909
DOI - 10.1117/1.2804233
Subject(s) - digital watermarking , computer science , watermark , computer security , digital content , protocol (science) , encryption , arbitration , cryptography , digital signature , computer network , embedding , world wide web , artificial intelligence , law , hash function , image (mathematics) , political science , medicine , alternative medicine , pathology
The secure verification is important for watermarking pro- tocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can re- cover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permu- tations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbi- tration can be conducted without the need for the cooperation of the
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom