1 October 2007 Watermarking protocol of secure verification
Jun Zhang, Weidong Kou, Kai Fan, Lei Ye
Author Affiliations +
Abstract
The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permutations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbitration can be conducted without the need for the cooperation of the WCA or the buyer.
©(2007) Society of Photo-Optical Instrumentation Engineers (SPIE)
Jun Zhang, Weidong Kou, Kai Fan, and Lei Ye "Watermarking protocol of secure verification," Journal of Electronic Imaging 16(4), 043002 (1 October 2007). https://doi.org/10.1117/1.2804233
Published: 1 October 2007
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Computer security

Distortion

Algorithm development

Information security

Computer science

Information technology

RELATED CONTENT

Elliptic curve cryptography
Proceedings of SPIE (April 22 2022)
The first BOWS contest (Break Our Watermarking System)
Proceedings of SPIE (February 27 2007)
New security system for ID certificates in IT society
Proceedings of SPIE (June 03 2004)
New watermarking method using convex chain
Proceedings of SPIE (July 31 2002)

Back to Top