Skip to main content

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection


We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.


  1. 1.

    Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.

    Google Scholar 

  2. 2.

    Cox IJ, Kilian J, Leighton FT, Shamoon TG: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673–1687. 10.1109/83.650120

    Article  Google Scholar 

  3. 3.

    Furon T, Venturini I, Duhamel P: A unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 269–279.

    Article  Google Scholar 

  4. 4.

    Furon T, Duhamel P: An asymmetric watermarking method. IEEE Transactions on Signal Processing 2003, 51(4):981–995. 10.1109/TSP.2003.809376

    MathSciNet  Article  Google Scholar 

  5. 5.

    Eggers JJ, Su JK, Girod B: Public key watermarking by eigenvectors of linear transforms. Proceedings of the European Signal Processing Conference (EUSIPCO '00), September 2000, Tampere, Finland

    Google Scholar 

  6. 6.

    Choi H, Lee K, Kim T: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 2004, 11(2):251–254. 10.1109/LSP.2003.819873

    Article  Google Scholar 

  7. 7.

    Miller ML: Is asymmetric watermarking necessary or sufficient? Proceedings of the European Signal Processing Conference (EUSIPCO '02), September 2002, Toulouse, France

    Google Scholar 

  8. 8.

    Ramkumar M, Akansu AN: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 2004, 6(3):469–478. 10.1109/TMM.2004.827494

    Article  Google Scholar 

  9. 9.

    Katzenbeisser S: On the integration of cryptography and watermarks. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2939: 50–60.

    Article  Google Scholar 

  10. 10.

    Memon N, Wong PW: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 2001, 10(4):643–649. 10.1109/83.913598

    Article  Google Scholar 

  11. 11.

    Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120–126. 10.1145/359340.359342

    MathSciNet  Article  Google Scholar 

  12. 12.

    Koblitz N: Algebraic Aspects of Cryptography. Springer, Berlin, Germany; 1998.

    Google Scholar 

  13. 13.

    Schneier B: Applied Cryptography. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.

    Google Scholar 

  14. 14.

    Burnett S, Paine S: RSA Security's Official Guide to Cryptography. Osborne/McGraw-Hill, Emeryville, Calif, USA; 2001.

    Google Scholar 

  15. 15.

    Hyvärinen A: Survey on independent component analysis. Neural Computing Surveys 1999, 2: 94–128.

    Google Scholar 

  16. 16.

    Lee T-W: Independent Component Analysis—Theory and Applications. Kluwer Academic, Dordrecht, The Netherlands; 1998.

    Google Scholar 

  17. 17.

    Jolliffre IT: Principal Component Analysis. Springer, Berlin, Germany; 2002.

    Google Scholar 

  18. 18.

    Noel SE, Szu HH: Multimedia authenticity with ICA watermarks. Wavelet Applications VII, April 2000, Orlando, Fla, USA, Proceedings of SPIE 4056: 175–184.

    Article  Google Scholar 

  19. 19.

    Yu D, Sattar F: A new blind watermarking technique based on independent component analysis. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2613: 51–63.

    Article  Google Scholar 

  20. 20.

    Mintzer F, Braudaway GW: If one watermark is good, are more better? IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999, Phoenix, Ariz, USA 4: 2067–2069.

    Google Scholar 

  21. 21.

    Cardoso J-F: High-order contrasts for independent component analysis. Neural Computation 1999, 11(1):157–192. 10.1162/089976699300016863

    MathSciNet  Article  Google Scholar 

  22. 22.

    Carver S, Memon N, Yeo B-L, Yeung MM: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 1998, 16(4):573–586. 10.1109/49.668979

    Article  Google Scholar 

  23. 23.

    Ramkumar M, Akansu AN: Image watermarks and counterfeit attacks: some problems and solutions. Proceedings of Content Security and Data Hiding in Digital Media, May 1999, Newark, NJ, USA

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Fawad Ahmed.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Ahmed, F., Sattar, F., Siyal, M.Y. et al. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection. EURASIP J. Adv. Signal Process. 2006, 056904 (2006).

Download citation


  • Information Technology
  • Quantum Information
  • Watermark Image
  • Watermark Scheme
  • Copyright Protection