Regular Articles

Watermarking protocol of secure verification

[+] Author Affiliations
Jun Zhang

University of Wollongong, School of Information Technology and Computer Science, Wollongong, New South Wales 2522, Australia jz484@uow.edu.au

Weidong Kou

Xidian University, The State Key Laboratory of Integrated Service Networks, Xi’an 710071, China

Kai Fan

Xidian University, The State Key Laboratory of Integrated Service Networks, Xi’an 710071, China

Lei Ye

University of Wollongong, School of Information Technology and Computer Science, Wollongong, New South Wales 2522, Australia

J. Electron. Imaging. 16(4), 043002 (November 08, 2007). doi:10.1117/1.2804233
History: Received October 03, 2006; Revised March 28, 2007; Accepted May 01, 2007; Published November 08, 2007
Text Size: A A A

The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permutations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbitration can be conducted without the need for the cooperation of the WCA or the buyer.

Figures in this Article
© 2007 SPIE and IS&T

Citation

Jun Zhang ; Weidong Kou ; Kai Fan and Lei Ye
"Watermarking protocol of secure verification", J. Electron. Imaging. 16(4), 043002 (November 08, 2007). ; http://dx.doi.org/10.1117/1.2804233


Tables

Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

PubMed Articles
Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.