phan2.pdf (203.18 kB)

Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents

Download (203.18 kB)
journal contribution
posted on 01.03.2011, 16:32 by Raphael C.-W. Phan, Bok-Min Goi, Geong-Sen Poh, Jongsung Kim
In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of security is a major concern. Security in this setting encompasses both in the interest of the human users as well as their information and objects that they own. A typical kind of transaction interaction among users and/or machines in these environments is that of exchanging digital objects via purchases and/or ownership transfers, e.g. someone buying a song from iTunes via his iPhone, or downloading either bought or rented movies onto a portable DVD player. Here, there is a need to provide trustworthy protection of the rights of both parties; i.e. the seller’s copyright needs to be protected against piracy, while on the other hand it has been highlighted in literature the need to protect innocent buyers from being framed. Indeed, if either party cannot be assured that his rights are protected when he is involved in transactions within such environments, he would shy away and instead prefer for instance the more conventional non-digital means of buying and selling. And therefore without active participation from human users and object owners it is difficult to fully kick off the actual realization of intelligent environments. Zhang et al. recently proposed a buyer–seller watermarking protocol without a trusted third party based on secret sharing. While it is a nice idea to eliminate the need of a trusted third party by distributing secret shares between the buyer and the seller such that neither party has knowledge of the fingerprint embedded in a content, we show that it is possible for a buyer to remove his part of the fingerprint from the content he bought. This directly disproves the piracy tracing property claimed by the protocol. In fact, since piracy tracing is one of the earliest security applications of watermarking schemes, it raises doubts as to the soundness of the design of this protocol.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Citation

PHAN, R.C.-W....et al., 2011. Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wireless Personal Communications, 56(1), pp. 73-83

Publisher

© Springer

Version

AM (Accepted Manuscript)

Publication date

2011

Notes

The original publication is available at www.springerlink.com

ISSN

0929-6212

Language

en

Exports