Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system

Nasir Memon, Ping Wah Wong

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Abstract

    Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

    Original languageEnglish (US)
    Title of host publicationProceedings of SPIE - The International Society for Optical Engineering
    PublisherSociety of Photo-Optical Instrumentation Engineers
    Pages289-294
    Number of pages6
    Volume3657
    StatePublished - Jan 1 1999
    EventProceedings of the 1999 Security and Watermarking of Multimedia Contents - San Jose, CA, USA
    Duration: Jan 25 1999Jan 27 1999

    Other

    OtherProceedings of the 1999 Security and Watermarking of Multimedia Contents
    CitySan Jose, CA, USA
    Period1/25/991/27/99

    Fingerprint

    Amplitude modulation
    Watermarking
    multimedia
    inserts

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Condensed Matter Physics

    Cite this

    Memon, N., & Wong, P. W. (1999). Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In Proceedings of SPIE - The International Society for Optical Engineering (Vol. 3657, pp. 289-294). Society of Photo-Optical Instrumentation Engineers.

    Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. / Memon, Nasir; Wong, Ping Wah.

    Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657 Society of Photo-Optical Instrumentation Engineers, 1999. p. 289-294.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Memon, N & Wong, PW 1999, Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. in Proceedings of SPIE - The International Society for Optical Engineering. vol. 3657, Society of Photo-Optical Instrumentation Engineers, pp. 289-294, Proceedings of the 1999 Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 1/25/99.
    Memon N, Wong PW. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. In Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657. Society of Photo-Optical Instrumentation Engineers. 1999. p. 289-294
    Memon, Nasir ; Wong, Ping Wah. / Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system. Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3657 Society of Photo-Optical Instrumentation Engineers, 1999. pp. 289-294
    @inbook{245e19b7dc5f4afa97b38a9e0b573096,
    title = "Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system",
    abstract = "Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.",
    author = "Nasir Memon and Wong, {Ping Wah}",
    year = "1999",
    month = "1",
    day = "1",
    language = "English (US)",
    volume = "3657",
    pages = "289--294",
    booktitle = "Proceedings of SPIE - The International Society for Optical Engineering",
    publisher = "Society of Photo-Optical Instrumentation Engineers",

    }

    TY - CHAP

    T1 - Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal public key crypto system

    AU - Memon, Nasir

    AU - Wong, Ping Wah

    PY - 1999/1/1

    Y1 - 1999/1/1

    N2 - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

    AB - Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

    UR - http://www.scopus.com/inward/record.url?scp=0033601662&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=0033601662&partnerID=8YFLogxK

    M3 - Chapter

    VL - 3657

    SP - 289

    EP - 294

    BT - Proceedings of SPIE - The International Society for Optical Engineering

    PB - Society of Photo-Optical Instrumentation Engineers

    ER -