- Research Article
- Open Access
A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
EURASIP Journal on Advances in Signal Processing volume 2006, Article number: 056904 (2006)
We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.
Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.
Cox IJ, Kilian J, Leighton FT, Shamoon TG: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673–1687. 10.1109/83.650120
Furon T, Venturini I, Duhamel P: A unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 269–279.
Furon T, Duhamel P: An asymmetric watermarking method. IEEE Transactions on Signal Processing 2003, 51(4):981–995. 10.1109/TSP.2003.809376
Eggers JJ, Su JK, Girod B: Public key watermarking by eigenvectors of linear transforms. Proceedings of the European Signal Processing Conference (EUSIPCO '00), September 2000, Tampere, Finland
Choi H, Lee K, Kim T: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 2004, 11(2):251–254. 10.1109/LSP.2003.819873
Miller ML: Is asymmetric watermarking necessary or sufficient? Proceedings of the European Signal Processing Conference (EUSIPCO '02), September 2002, Toulouse, France
Ramkumar M, Akansu AN: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 2004, 6(3):469–478. 10.1109/TMM.2004.827494
Katzenbeisser S: On the integration of cryptography and watermarks. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2939: 50–60.
Memon N, Wong PW: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 2001, 10(4):643–649. 10.1109/83.913598
Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120–126. 10.1145/359340.359342
Koblitz N: Algebraic Aspects of Cryptography. Springer, Berlin, Germany; 1998.
Schneier B: Applied Cryptography. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.
Burnett S, Paine S: RSA Security's Official Guide to Cryptography. Osborne/McGraw-Hill, Emeryville, Calif, USA; 2001.
Hyvärinen A: Survey on independent component analysis. Neural Computing Surveys 1999, 2: 94–128.
Lee T-W: Independent Component Analysis—Theory and Applications. Kluwer Academic, Dordrecht, The Netherlands; 1998.
Jolliffre IT: Principal Component Analysis. Springer, Berlin, Germany; 2002.
Noel SE, Szu HH: Multimedia authenticity with ICA watermarks. Wavelet Applications VII, April 2000, Orlando, Fla, USA, Proceedings of SPIE 4056: 175–184.
Yu D, Sattar F: A new blind watermarking technique based on independent component analysis. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2613: 51–63.
Mintzer F, Braudaway GW: If one watermark is good, are more better? IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999, Phoenix, Ariz, USA 4: 2067–2069.
Cardoso J-F: High-order contrasts for independent component analysis. Neural Computation 1999, 11(1):157–192. 10.1162/089976699300016863
Carver S, Memon N, Yeo B-L, Yeung MM: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 1998, 16(4):573–586. 10.1109/49.668979
Ramkumar M, Akansu AN: Image watermarks and counterfeit attacks: some problems and solutions. Proceedings of Content Security and Data Hiding in Digital Media, May 1999, Newark, NJ, USA
About this article
Cite this article
Ahmed, F., Sattar, F., Siyal, M.Y. et al. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection. EURASIP J. Adv. Signal Process. 2006, 056904 (2006). https://doi.org/10.1155/ASP/2006/56904
- Information Technology
- Quantum Information
- Watermark Image
- Watermark Scheme
- Copyright Protection