Skip to main content


Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

  • 792 Accesses

  • 3 Citations


We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.


  1. 1.

    Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.

  2. 2.

    Cox IJ, Kilian J, Leighton FT, Shamoon TG: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673–1687. 10.1109/83.650120

  3. 3.

    Furon T, Venturini I, Duhamel P: A unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 269–279.

  4. 4.

    Furon T, Duhamel P: An asymmetric watermarking method. IEEE Transactions on Signal Processing 2003, 51(4):981–995. 10.1109/TSP.2003.809376

  5. 5.

    Eggers JJ, Su JK, Girod B: Public key watermarking by eigenvectors of linear transforms. Proceedings of the European Signal Processing Conference (EUSIPCO '00), September 2000, Tampere, Finland

  6. 6.

    Choi H, Lee K, Kim T: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 2004, 11(2):251–254. 10.1109/LSP.2003.819873

  7. 7.

    Miller ML: Is asymmetric watermarking necessary or sufficient? Proceedings of the European Signal Processing Conference (EUSIPCO '02), September 2002, Toulouse, France

  8. 8.

    Ramkumar M, Akansu AN: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 2004, 6(3):469–478. 10.1109/TMM.2004.827494

  9. 9.

    Katzenbeisser S: On the integration of cryptography and watermarks. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2939: 50–60.

  10. 10.

    Memon N, Wong PW: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 2001, 10(4):643–649. 10.1109/83.913598

  11. 11.

    Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120–126. 10.1145/359340.359342

  12. 12.

    Koblitz N: Algebraic Aspects of Cryptography. Springer, Berlin, Germany; 1998.

  13. 13.

    Schneier B: Applied Cryptography. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.

  14. 14.

    Burnett S, Paine S: RSA Security's Official Guide to Cryptography. Osborne/McGraw-Hill, Emeryville, Calif, USA; 2001.

  15. 15.

    Hyvärinen A: Survey on independent component analysis. Neural Computing Surveys 1999, 2: 94–128.

  16. 16.

    Lee T-W: Independent Component Analysis—Theory and Applications. Kluwer Academic, Dordrecht, The Netherlands; 1998.

  17. 17.

    Jolliffre IT: Principal Component Analysis. Springer, Berlin, Germany; 2002.

  18. 18.

    Noel SE, Szu HH: Multimedia authenticity with ICA watermarks. Wavelet Applications VII, April 2000, Orlando, Fla, USA, Proceedings of SPIE 4056: 175–184.

  19. 19.

    Yu D, Sattar F: A new blind watermarking technique based on independent component analysis. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2613: 51–63.

  20. 20.

    Mintzer F, Braudaway GW: If one watermark is good, are more better? IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999, Phoenix, Ariz, USA 4: 2067–2069.

  21. 21.

    Cardoso J-F: High-order contrasts for independent component analysis. Neural Computation 1999, 11(1):157–192. 10.1162/089976699300016863

  22. 22.

    Carver S, Memon N, Yeo B-L, Yeung MM: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 1998, 16(4):573–586. 10.1109/49.668979

  23. 23.

    Ramkumar M, Akansu AN: Image watermarks and counterfeit attacks: some problems and solutions. Proceedings of Content Security and Data Hiding in Digital Media, May 1999, Newark, NJ, USA

Download references

Author information

Correspondence to Fawad Ahmed.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Ahmed, F., Sattar, F., Siyal, M.Y. et al. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection. EURASIP J. Adv. Signal Process. 2006, 056904 (2006).

Download citation


  • Information Technology
  • Quantum Information
  • Watermark Image
  • Watermark Scheme
  • Copyright Protection