• Title/Summary/Keyword: Buyer-seller Watermarking Protocol

Search Result 9, Processing Time 0.029 seconds

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

POCS Based Digital Watermarking in Buyer-Seller Watermarking Protocal (Buyer-Seller 워터마킹 프로토콜 상에서 POCS 기반의 디지털 워터마킹)

  • Kwon, Seong-Geun;Lee, Ji-Hye;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.569-582
    • /
    • 2007
  • Digital watermarking technique for copyright protection and prevention of illegal copy and distribution can provide the reliable transaction to both buyer and seller in e-commerce through the cryptographic protocol such as 'Buyer-seller watermarking protocol'. Recently there has been researched about some cryptographic protocols for watermarking system but there has no yet mentioned about the implementation of practical watermarking technique in protocol. This paper presents the watermark embedding technique based on POCS in buyer-seller watermarking protocol. The proposed method designs the robust convex set based on EZW and the invisible convex set using PSNR and then projects into two sets until the convergence condition is satisfied. Experimental results verified that BER of watermark that is embedded by the proposed method has lower 0.02-0.10 than BER of the conventional method.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Mobile 3D Contents Watermarking Technique Based on Buyer-Seller Watermarking Protocol (Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Bae, Sung-Ho;Park, Jae-Bum;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.788-799
    • /
    • 2007
  • This paper presents a watermarking method for copyright protection and illegal copy prevention of mobile 3D contents. The proposed method embeds copyright information and user's phone number into spatial domain and encryption domain of mobile animation data based on Buyer-Seller watermarking protocol. Furthermore, we insert user's operation key so that only authorized user can play 3D animation game in mobile device. We implemented the proposed method by using mobile animation tool, G3-SDK. From experimental results, we verified that the proposed method is capable of copyright protection and illegal copy prevention since the watermark can be well extracted against geometrical attacks, such as noise addition, data accuracy variableness and data up/down scaling.

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol (Yong-Lee의 익명 핑거프린팅 프로토콜의 안전성 취약점 및 개선 방안)

  • Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.151-155
    • /
    • 2006
  • In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Mobile 3D Content Watermarking Scheme Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Seung, Teak-Young;Lee, Suk-Hwan;Park, Seung-Seop;Kwon, Ki-Ryong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1539-1542
    • /
    • 2009
  • 최근 모바일 단말 기술과 정보통신 기술의 급격한 발달로 국내외 이동통신사들은 새로운 킬러 콘텐츠로 주목받고 있는 모바일 3D 게임을 앞 다투어 제작 및 서비스하고 있다. 모바일 3D 게임의 경우, 용량 증가로 인한 데이터 통신비 부담을 줄이기 위하여 PC 다운로드 S/W을 통한 다운로드 방법이 제공되면서 불법 복제 우려에 대한 관심이 높아지고 있다. 현재 불법 복제 방지와 관련하여 GVM/GNEX 인증 모듈이 적용되고 있으나, 모바일 3D 콘텐츠에 대한 저작권 보호 기술 및 워터마킹 기술을 적용함으로써 콘텐츠 접근제어 및 불법배포 추적을 동시에 달성할 수 있다. 따라서 본 논문에서는 모바일 3D 콘텐츠의 저작권 보호를 위하여 익명 Buyer-Seller 워터마킹 프로토콜 상에서 3D 콘텐츠 내의 공간영역 및 암호화 영역 내에 다중 워터마크를 삽입하는 방법을 제안한다. 성능평가를 위한 비가시성 및 강인성 실험을 통하여 본 제안 기법의 콘텐츠 접근제어가 가능하며 비가시성, 강인성 면에서 우수함을 확인하였다.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.