{"title":"A New Watermarking Protocol of Copyright Protection","authors":"Ru Zhang, Xiaohui Yu, Linna Zhou, Hong-peng Li","doi":"10.1109/IIH-MSP.2006.23","DOIUrl":null,"url":null,"abstract":"Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To address this issue, a new watermarking protocol proposed in this article uses three watermarks in structure. By introducing the CA, the signature and the timestamp, the protocol sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem. Because ICP and customer cannot remove the watermark from watermarked digital content, and neither the copyrighter nor the ICP can fabricate piracy, the proposed protocol can trace piracy. With the proxy signature, the digital content transaction without the Third party is performed in which there are only two participants, the seller and the buyer.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Intelligent Information Hiding and Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2006.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To address this issue, a new watermarking protocol proposed in this article uses three watermarks in structure. By introducing the CA, the signature and the timestamp, the protocol sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem. Because ICP and customer cannot remove the watermark from watermarked digital content, and neither the copyrighter nor the ICP can fabricate piracy, the proposed protocol can trace piracy. With the proxy signature, the digital content transaction without the Third party is performed in which there are only two participants, the seller and the buyer.