A buyer-seller watermarking protocol

Nasir Memon, Ping Wah Wong

Research output: Contribution to journalArticle

Abstract

Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multi-media content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

Original languageEnglish (US)
Pages (from-to)643-649
Number of pages7
JournalIEEE Transactions on Image Processing
Volume10
Issue number4
DOIs
StatePublished - Apr 2001

Fingerprint

Watermark
Watermarking
Digital Watermark
Multimedia

Keywords

  • Copy deterrence
  • Digital watermarking
  • Finger-printing
  • Watermarking protocols

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Graphics and Computer-Aided Design
  • Software
  • Theoretical Computer Science
  • Computational Theory and Mathematics
  • Computer Vision and Pattern Recognition

Cite this

A buyer-seller watermarking protocol. / Memon, Nasir; Wong, Ping Wah.

In: IEEE Transactions on Image Processing, Vol. 10, No. 4, 04.2001, p. 643-649.

Research output: Contribution to journalArticle

Memon, Nasir ; Wong, Ping Wah. / A buyer-seller watermarking protocol. In: IEEE Transactions on Image Processing. 2001 ; Vol. 10, No. 4. pp. 643-649.
@article{8024cbe73b0e4b258932476b48ef0b46,
title = "A buyer-seller watermarking protocol",
abstract = "Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multi-media content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.",
keywords = "Copy deterrence, Digital watermarking, Finger-printing, Watermarking protocols",
author = "Nasir Memon and Wong, {Ping Wah}",
year = "2001",
month = "4",
doi = "10.1109/83.913598",
language = "English (US)",
volume = "10",
pages = "643--649",
journal = "IEEE Transactions on Image Processing",
issn = "1057-7149",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - A buyer-seller watermarking protocol

AU - Memon, Nasir

AU - Wong, Ping Wah

PY - 2001/4

Y1 - 2001/4

N2 - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multi-media content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

AB - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multi-media content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

KW - Copy deterrence

KW - Digital watermarking

KW - Finger-printing

KW - Watermarking protocols

UR - http://www.scopus.com/inward/record.url?scp=0035307977&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0035307977&partnerID=8YFLogxK

U2 - 10.1109/83.913598

DO - 10.1109/83.913598

M3 - Article

C2 - 18249653

AN - SCOPUS:0035307977

VL - 10

SP - 643

EP - 649

JO - IEEE Transactions on Image Processing

JF - IEEE Transactions on Image Processing

SN - 1057-7149

IS - 4

ER -