Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2008, Article ID 905065, 7 pages
http://dx.doi.org/10.1155/2008/905065
Research Article

A Lightweight Buyer-Seller Watermarking Protocol

1Information Security Laborator, Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613
2School of Information Systems, Singapore management University, Singapore 178902

Received 4 March 2008; Revised 3 June 2008; Accepted 6 June 2008

Academic Editor: Chiou-Ting Hsu

Copyright © 2008 Yongdong Wu and Hweehua Pang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '99), vol. 4, pp. 2067–2069, Phoenix, Ariz, USA, March 1999. View at Publisher · View at Google Scholar
  2. C.-S. Lu and H.-Y. M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579–1592, 2001. View at Publisher · View at Google Scholar
  3. C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000. View at Publisher · View at Google Scholar
  4. F. Ahmed, F. Sattar, M. Y. Siyal, and D. Yu, “A secure watermarking scheme for buyer-seller identification and copyright protection,” EURASIP Journal on Applied Signal Processing, vol. 2006, Article ID 56904, 15 pages, 2006. View at Publisher · View at Google Scholar
  5. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar
  6. S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573–586, 1998. View at Publisher · View at Google Scholar
  7. Y. Wang, J. F. Doherty, and R. E. Van Dyck, “A wavelet-based watermarking algorithm for ownership verification of digital images,” IEEE Transactions on Image Processing, vol. 11, no. 2, pp. 77–88, 2002. View at Publisher · View at Google Scholar
  8. A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “A watermarking technique for the protection of digital images IPR,” in Advances in Information Technologies: The Business Challenge, pp. 636–643, IOS Press, Amsterdam, The Netherlands, 1998. View at Google Scholar
  9. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001. View at Publisher · View at Google Scholar
  10. L. Qiao and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightful ownership and customer's rights,” Journal of Visual Communication and Image Representation, vol. 9, no. 3, pp. 194–210, 1998. View at Publisher · View at Google Scholar
  11. N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, vol. 10, no. 4, pp. 643–649, 2001. View at Publisher · View at Google Scholar
  12. N. D. Memon and P. W. Wong, “Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System,” in Security and Watermarking of Multimedia Contents, vol. 3657 of Proceedings of SPIE, pp. 289–294, San Jose, Calif, USA, January 1999. View at Publisher · View at Google Scholar
  13. R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar
  14. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, chapter 8, CRC Press, Boca Raton, Fla, USA, 1996.
  15. C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, “An efficient and anonymous buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, vol. 13, no. 12, pp. 1618–1626, 2004. View at Publisher · View at Google Scholar
  16. J. Zhang, W. Kou, K. Fan, and L. Ye, “Watermarking protocol of secure verification,” Journal of Electronic Imaging, vol. 16, no. 4, Article ID 043002, 4 pages, 2007. View at Publisher · View at Google Scholar
  17. B. Zhao, W. Kou, J. Zhang, and K. Fan, “A watermarking scheme in the encrypted domain for watermarking protocol,” in Proceedings of the 3rd SKLOIS Conference on Information Security and Cryptology (Inscrypt '07), Xining, China, August-September 2007.
  18. B.-M. Goi, R. C.-W. Phan, Y. Yang, F. Bao, R. H. Deng, and M. U. Siddiqi, “Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity,” in Proceedings of the 2nd International Conference on Applied Cryptography and Network Security (ACNS '04), vol. 3089 of Lecture Notes in Computer Science, pp. 369–382, Yellow Mountain, China, June 2004.
  19. M. Kuribayashi and H. Tanaka, “Fingerprinting protocol for images based on additive homomorphic property,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2129–2139, 2005. View at Publisher · View at Google Scholar
  20. H. Guo and N. D. Georganas, “Digital image watermarking for joint ownership,” in Proceedings of the 10th ACM International Conference on Multimedia, pp. 362–371, Juan-les-Pins, France, December 2002. View at Publisher · View at Google Scholar
  21. P. H. W. Wong, O. C. Au, and Y. M. Yeung, “Novel blind multiple watermarking technique for images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 813–830, 2003. View at Publisher · View at Google Scholar
  22. E.-C. Chang, S. Mallat, and C. Yap, “Wavelet foveation,” Applied and Computational Harmonic Analysis, vol. 9, no. 3, pp. 312–335, 2000. View at Publisher · View at Google Scholar
  23. F. Bao, R. Deng, P. Feng, Y. Guo, and H. Wu, “Secure and private distribution of online video and some related cryptographic issues,” in Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP '01), vol. 2119 of Lecture Notes in Computer Science, pp. 190–205, Sydney, Australia, July 2001. View at Publisher · View at Google Scholar
  24. D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals, Standard and Practice, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2001.
  25. D. Wei, Crypto++ 5.2.1 Benchmarks, http://www.eskimo.com/~weidai/benchmarks.html.