Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system

Nasir Memon, Ping Wah Wong

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

Original languageEnglish (US)
Title of host publicationProceedings of SPIE - The International Society for Optical Engineering
PublisherSociety of Photo-Optical Instrumentation Engineers
Pages289-294
Number of pages6
Volume3657
StatePublished - Jan 1 1999
EventProceedings of the 1999 Security and Watermarking of Multimedia Contents - San Jose, CA, USA
Duration: Jan 25 1999Jan 27 1999

Other

OtherProceedings of the 1999 Security and Watermarking of Multimedia Contents
CitySan Jose, CA, USA
Period1/25/991/27/99

Fingerprint

Amplitude modulation
Watermarking
multimedia
inserts

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Condensed Matter Physics

Cite this

Memon, N., & Wong, P. W. (1999). Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In Proceedings of SPIE - The International Society for Optical Engineering (Vol. 3657, pp. 289-294). Society of Photo-Optical Instrumentation Engineers.

Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. / Memon, Nasir; Wong, Ping Wah.

Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657 Society of Photo-Optical Instrumentation Engineers, 1999. p. 289-294.

Research output: Chapter in Book/Report/Conference proceedingChapter

Memon, N & Wong, PW 1999, Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. in Proceedings of SPIE - The International Society for Optical Engineering. vol. 3657, Society of Photo-Optical Instrumentation Engineers, pp. 289-294, Proceedings of the 1999 Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 1/25/99.
Memon N, Wong PW. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657. Society of Photo-Optical Instrumentation Engineers. 1999. p. 289-294
Memon, Nasir ; Wong, Ping Wah. / Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657 Society of Photo-Optical Instrumentation Engineers, 1999. pp. 289-294
@inbook{245e19b7dc5f4afa97b38a9e0b573096,
title = "Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system",
abstract = "Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.",
author = "Nasir Memon and Wong, {Ping Wah}",
year = "1999",
month = "1",
day = "1",
language = "English (US)",
volume = "3657",
pages = "289--294",
booktitle = "Proceedings of SPIE - The International Society for Optical Engineering",
publisher = "Society of Photo-Optical Instrumentation Engineers",

}

TY - CHAP

T1 - Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system

AU - Memon, Nasir

AU - Wong, Ping Wah

PY - 1999/1/1

Y1 - 1999/1/1

N2 - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

AB - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

UR - http://www.scopus.com/inward/record.url?scp=0033601662&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0033601662&partnerID=8YFLogxK

M3 - Chapter

AN - SCOPUS:0033601662

VL - 3657

SP - 289

EP - 294

BT - Proceedings of SPIE - The International Society for Optical Engineering

PB - Society of Photo-Optical Instrumentation Engineers

ER -