增强的买方卖方水印协议

Chinchen Chang, Chi-Yien Chung
{"title":"增强的买方卖方水印协议","authors":"Chinchen Chang, Chi-Yien Chung","doi":"10.1109/ICCT.2003.1209872","DOIUrl":null,"url":null,"abstract":"Digital watermarks are helpful about the possession identification as well as copyright and intellectual property protection for tons and tons of multimedia data transmitted through the Internet. In a buyer-seller watermarking protocol, both seller and buyer have to insert their watermarks into a copy. If unauthorized parties have drifted into market, the watermark detection and extraction algorithm will both identify exactly who has the legal ownership of that copy and trace back to the illegal reseller. In Memon and Wong's protocol, the seller is responsible for watermarks insertion, but she/he has no idea what the buyer's watermark is. As a result, the seller has no way to forge the buyer's watermark. However, the seller doesn't have to use her/his own private information in the watermark insertion process. This may bring about the problem of man in the middle attack. Besides, in their protocol, if there is a dispute, a judge is a must. To improve those shortcomings, we shall propose a new scheme where the seller has to use her/his own private key to do the watermarking insertion job. In our scheme, everyone can be the judge if there is a quarrel over the copyright. This provides a simple and fair solution to the judgment of copy deterrence.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"An enhanced buyer seller watermarking protocol\",\"authors\":\"Chinchen Chang, Chi-Yien Chung\",\"doi\":\"10.1109/ICCT.2003.1209872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital watermarks are helpful about the possession identification as well as copyright and intellectual property protection for tons and tons of multimedia data transmitted through the Internet. In a buyer-seller watermarking protocol, both seller and buyer have to insert their watermarks into a copy. If unauthorized parties have drifted into market, the watermark detection and extraction algorithm will both identify exactly who has the legal ownership of that copy and trace back to the illegal reseller. In Memon and Wong's protocol, the seller is responsible for watermarks insertion, but she/he has no idea what the buyer's watermark is. As a result, the seller has no way to forge the buyer's watermark. However, the seller doesn't have to use her/his own private information in the watermark insertion process. This may bring about the problem of man in the middle attack. Besides, in their protocol, if there is a dispute, a judge is a must. To improve those shortcomings, we shall propose a new scheme where the seller has to use her/his own private key to do the watermarking insertion job. In our scheme, everyone can be the judge if there is a quarrel over the copyright. This provides a simple and fair solution to the judgment of copy deterrence.\",\"PeriodicalId\":237858,\"journal\":{\"name\":\"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-04-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2003.1209872\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2003.1209872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25

摘要

数字水印对于通过互联网传输的海量多媒体数据的所有权识别、版权和知识产权保护具有重要意义。在买卖双方的水印协议中,买卖双方都必须在副本中插入各自的水印。如果未授权方进入市场,水印检测和提取算法将准确识别谁拥有该副本的合法所有权,并追溯到非法经销商。在Memon和Wong的协议中,卖方负责水印插入,但她/他不知道买方的水印是什么。因此,卖方没有办法伪造买方的水印。然而,卖家在水印插入过程中不必使用自己的私人信息。这可能会带来中路进攻的问题。此外,在他们的协议中,如果有争议,法官是必须的。为了改进这些缺点,我们提出了一种新的方案,即卖方必须使用自己的私钥进行水印插入工作。在我们的方案中,如果发生版权纠纷,每个人都可以成为裁判。这为复制威慑的判断提供了一个简单公正的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An enhanced buyer seller watermarking protocol
Digital watermarks are helpful about the possession identification as well as copyright and intellectual property protection for tons and tons of multimedia data transmitted through the Internet. In a buyer-seller watermarking protocol, both seller and buyer have to insert their watermarks into a copy. If unauthorized parties have drifted into market, the watermark detection and extraction algorithm will both identify exactly who has the legal ownership of that copy and trace back to the illegal reseller. In Memon and Wong's protocol, the seller is responsible for watermarks insertion, but she/he has no idea what the buyer's watermark is. As a result, the seller has no way to forge the buyer's watermark. However, the seller doesn't have to use her/his own private information in the watermark insertion process. This may bring about the problem of man in the middle attack. Besides, in their protocol, if there is a dispute, a judge is a must. To improve those shortcomings, we shall propose a new scheme where the seller has to use her/his own private key to do the watermarking insertion job. In our scheme, everyone can be the judge if there is a quarrel over the copyright. This provides a simple and fair solution to the judgment of copy deterrence.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信