22
An Efficient and Anonymous Buyer-Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL. 13, NO. 12, December 2004 Multimedia Security

An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

  • View
    217

  • Download
    4

Embed Size (px)

Citation preview

Page 1: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

An Efficient and Anonymous Buyer-Seller Watermarking Protocol

C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL. 13, NO. 12, December 2004

Multimedia Security

Page 2: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Outline

• Customer’s Right Problem

• Buyer-Seller Watermarking Protocol

• Unbinding Problem

• The Proposed Watermarking Protocol

• Discussion

Page 3: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Customer’s Right Problem

• In traditional watermarking scenarios, the seller is entitled to the responsibility of generating and inserting digital watermarks. As a result, the seller is granted access to each watermarked copy.

• A malicious seller can easily frame the buyer by releasing corresponding watermarked copy afterwards.

Page 4: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Memon and Wong’s Protocol

B & IDB

SignWCA(EB(W))

W

SignWCA(EB(W))

EB(W’)=P(EB(W))EB(X’)=EB(X+W’)= EB(X)+EB(W’)

X’=DB-1

(EB(X’))

Privacy Homomorphism

Page 5: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Memon and Wong’s Protocol

Page 6: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Memon and Wong’s Protocol

Page 7: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Memon and Wong’s Protocol

Page 8: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Unbinding Problem

• Failure to bind a watermark to a certain piece of content – U’=U+P1(W1), V’=V+P2(W2)

– If Seller gets V’, P2(W2) is available to seller.

– EB(U+P2(W2)) now can be generated

Page 9: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Roles

• S: seller

• B: buyer

• CA: A trusted certification authority, issuing anonymous certificate

• WCA: a trusted watermark certificate authority

• ARB: arbiter

Page 10: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Notations

• (pkI, skI) : a public-private key pair for owner I• (pk*, sk*): a one-time key pair• SignI(M): digital signature of message M signed by I• DskI /EpkI : Decryption and encryption function• X+W: watermarked version of X, + standards for waterm

ark insertion• ARG: common agreement between buyer and seller, ne

gotiated in advance

Page 11: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Registration Protocol

• B first sends a randomly selected pkB to CA. When CA receives pkB,, it generates an anonymous certificate CertCA(pkB) and sends it back to B.

• The registration process can be skipped if anonymity is not a concern

Page 12: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 13: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

X’=X+V

Epk*(X’’)=Epk*(X’+W)=Epk*(X’)+Epk*(W)Store sales records

Page 14: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 15: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 16: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 17: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 18: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 19: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

The Proposed Protocol

Page 20: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Identification and Arbitration

SellerArbiter

Y, X’, CertCA(pkB), CertpkB(pk*), ARG, Signpk*(ARG), Epk*(W), Epkwca(W),SignWCA(Epk*(W), pk*, Signpk*(ARG))

WCA

W

CA

Buyer using pk*

Page 21: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Solving Unbinding Problem

• SignWCA(Epk*(W), pk*, Signpk*(ARG)) explicitly binds W to ARG

• By introducing the one-time key pairs, it is impossible for S to fool B.

Page 22: An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL

Accomplishment of Other Goals

• Buyer’s privacy is well protected by using anonymous certificate.

• Only one communication with seller is required for the buyer now

• Trusted third parties are capable of making appropriate adjudications, no cooperation from buyer is required.

• The WCA gets information about the digital content, thus a more robust watermark may be tailored.