DOI QR코드

DOI QR Code

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling (Dept. of Computer Science and Information Engineering, Chaoyang University of Technology) ;
  • Chen, Chin-Chang (Dept. of Computer Science and Information Engineering, National Chung Hsing University)
  • Received : 2010.07.19
  • Accepted : 2010.10.15
  • Published : 2011.08.29

Abstract

As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

Keywords

References

  1. N.D. Memon, P.W. Wong, "A Buyer-Seller Watermarking Protocol," IEEE Transactions on Image Processing," vol. 10, no. 4, pp. 643-649, 2001. https://doi.org/10.1109/83.913598
  2. L. Qian, K. Nahrstedt, "Watermarking Schemes and Protocols for Protecting Rightful Ownerships and Customer's Rights," Journal of Visual Communication and Image Representation, vol. 9, no. 3, pp. 194-210, 1998. https://doi.org/10.1006/jvci.1998.0391
  3. C.L. Lei, P.L. Yu, P.L. Tsai, M.H. Chan, "An Efficient and Anonymous Buyer Seller Watermarking Protocol," IEEE Transactions on Image Processing, vol. 13, no. 12, pp. 1618-1626, 2004. https://doi.org/10.1109/TIP.2004.837553
  4. C.C. Chang, C.Y. Chung, "An Enhanced Buyer Seller Watermarking Protocol," in Proc. of International Conference on Communication Technology, vol. 2, pp. 1779-1783, Apr. 2003.
  5. J. Zhang, W. Kou, K. Fan, "Secure Buyer-Seller Watermarking Protocol," IEEE Proceedings, vol. 153, pp. 15-18, 2006. https://doi.org/10.1049/ip-com:20045332
  6. M. Kuribayashiv, H. Tanaka, "Fingerprinting Protocol for On-line Trade using Information Gap between Buyer and Merchant," IEICE Transsactions. Fundamentals, vol. E89-A, no.4, pp. 1108-1115, 2006. https://doi.org/10.1093/ietfec/e89-a.4.1108
  7. C.I. Fan, M.T. Chen, W.Z. Sun, "Buyer Seller Watermarking Protocols with Off-line Trusted Parties,"International Journal of Ad Hoc and Ubiquitous Computing, vol. 4, no.1, pp. 36-43, 2009. https://doi.org/10.1504/IJAHUC.2009.021912
  8. I.M. Ibrahim, S.H.N. El-Din, A.F.A. Hegazy, "An Effective and Secure Buyer Seller Watermarking Protocol," in Proc. of third International Symposium on Information Assurance and Security (IAS 2007), pp. 21-26, 2007.
  9. M. Deng, B. Preneel, "On Secure and Anonymous Buyer Seller Watermarking Protocol," in Proc. of The Third International Conference on Internet and Web Applications and Services, pp. 524-529, 2008.
  10. S.C. Cheung, H. Curreem, "Rights Protection for Digital Contents Redistribution over the Internet," in Proc. of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02), Oxford, UK, pp. 105-110, 2002.
  11. T. H. Chen, G.B. Horng, D.S. Tsai, "An Anonymous Buyer Reseller Watermarking Protocol," Journal of the Chinese Institute of Engineers, vol. 28, no. 3, pp. 535-538, 2005. https://doi.org/10.1080/02533839.2005.9671019
  12. Q. Liu, Z. Chen, Z. Zhou, "Research on Secure Buyer Seller Watermarking Protocol," Journal of Systems Engineering and Electronics, vol. 19, no. 2, pp. 370-376, 2008. https://doi.org/10.1016/S1004-4132(08)60094-8
  13. R.L. Rivest, L. Adleman, M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, pp. 169-179, 1978.
  14. P. Meerwald, A. Uhl, "A Survey of Wavelet-Domain Watermarking Algorithms," in Proc. of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Content III, San Jose, CA, vol. 4314, pp. 505-516, Jan. 2001.
  15. I.J. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no.12, pp. 1673-1687, 1997. https://doi.org/10.1109/83.650120

Cited by

  1. Design and Implementation of Digital Jikin using Smartphone Application vol.18, pp.5, 2011, https://doi.org/10.7472/jksii.2017.18.5.87