Open Access

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

  • Fawad Ahmed1Email author,
  • Farook Sattar1,
  • Mohammed Yakoob Siyal1 and
  • Dan Yu1
EURASIP Journal on Advances in Signal Processing20062006:056904

https://doi.org/10.1155/ASP/2006/56904

Received: 6 April 2005

Accepted: 29 January 2006

Published: 7 May 2006

Abstract

We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

[1234567891011121314151617181920212223]

Authors’ Affiliations

(1)
School of Electrical and Electronic Engineering, Nanyang Technological University

References

  1. Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, Calif, USA; 2001.Google Scholar
  2. Cox IJ, Kilian J, Leighton FT, Shamoon TG: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673-1687. 10.1109/83.650120View ArticleGoogle Scholar
  3. Furon T, Venturini I, Duhamel P: A unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 269-279.View ArticleGoogle Scholar
  4. Furon T, Duhamel P: An asymmetric watermarking method. IEEE Transactions on Signal Processing 2003, 51(4):981-995. 10.1109/TSP.2003.809376MathSciNetView ArticleGoogle Scholar
  5. Eggers JJ, Su JK, Girod B: Public key watermarking by eigenvectors of linear transforms. Proceedings of the European Signal Processing Conference (EUSIPCO '00), September 2000, Tampere, FinlandGoogle Scholar
  6. Choi H, Lee K, Kim T: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 2004, 11(2):251-254. 10.1109/LSP.2003.819873View ArticleGoogle Scholar
  7. Miller ML: Is asymmetric watermarking necessary or sufficient? Proceedings of the European Signal Processing Conference (EUSIPCO '02), September 2002, Toulouse, FranceGoogle Scholar
  8. Ramkumar M, Akansu AN: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 2004, 6(3):469-478. 10.1109/TMM.2004.827494View ArticleGoogle Scholar
  9. Katzenbeisser S: On the integration of cryptography and watermarks. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2939: 50-60.View ArticleGoogle Scholar
  10. Memon N, Wong PW: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 2001, 10(4):643-649. 10.1109/83.913598View ArticleMATHGoogle Scholar
  11. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120-126. 10.1145/359340.359342MathSciNetView ArticleMATHGoogle Scholar
  12. Koblitz N: Algebraic Aspects of Cryptography. Springer, Berlin, Germany; 1998.View ArticleMATHGoogle Scholar
  13. Schneier B: Applied Cryptography. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.MATHGoogle Scholar
  14. Burnett S, Paine S: RSA Security's Official Guide to Cryptography. Osborne/McGraw-Hill, Emeryville, Calif, USA; 2001.MATHGoogle Scholar
  15. Hyvärinen A: Survey on independent component analysis. Neural Computing Surveys 1999, 2: 94-128.Google Scholar
  16. Lee T-W: Independent Component Analysis—Theory and Applications. Kluwer Academic, Dordrecht, The Netherlands; 1998.MATHGoogle Scholar
  17. Jolliffre IT: Principal Component Analysis. Springer, Berlin, Germany; 2002.Google Scholar
  18. Noel SE, Szu HH: Multimedia authenticity with ICA watermarks. Wavelet Applications VII, April 2000, Orlando, Fla, USA, Proceedings of SPIE 4056: 175-184.View ArticleGoogle Scholar
  19. Yu D, Sattar F: A new blind watermarking technique based on independent component analysis. International Workshop on Digital Watermarking, October 2003, Seoul, Korea, Springer Lecture Notes in Computer Science 2613: 51-63.View ArticleMATHGoogle Scholar
  20. Mintzer F, Braudaway GW: If one watermark is good, are more better? IEEE International Conference on Acoustics, Speech, and Signal Processing, March 1999, Phoenix, Ariz, USA 4: 2067-2069.Google Scholar
  21. Cardoso J-F: High-order contrasts for independent component analysis. Neural Computation 1999, 11(1):157-192. 10.1162/089976699300016863MathSciNetView ArticleGoogle Scholar
  22. Carver S, Memon N, Yeo B-L, Yeung MM: Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 1998, 16(4):573-586. 10.1109/49.668979View ArticleGoogle Scholar
  23. Ramkumar M, Akansu AN: Image watermarks and counterfeit attacks: some problems and solutions. Proceedings of Content Security and Data Hiding in Digital Media, May 1999, Newark, NJ, USAGoogle Scholar

Copyright

© Ahmed et al. 2006