AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING

Geong Sen Poh, Adrian Leung

Abstract

Many Content Distribution Protection (CDP) schemes (e.g. Buyer-Seller Watermarking and Asymmetric Fingerprinting) have been proposed to address the problem of illegal distribution of copyrighted content. All of the existing CDP schemes rely on a Trusted Third Party in one way or another to achieve the desired security objectives. In this paper, using the functionalities of Trusted Computing, we present an anonymous CDP watermarking scheme, which minimises the reliance on a Trusted Third Party. Our scheme allows a buyer to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing content illegally.

References

  1. Balacheff, B., Chen, L., Pearson, S., Plaquin, D., and Proudler, G. (2003). Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, NJ, USA.
  2. Brickell, E., Camenisch, J., and Chen, L. (2004). Direct anonymous attestation. In 11th ACM Conf. on Computer and Communications Security, pages 132-145. ACM Press.
  3. Camenisch, J. (2000). Efficient anonymous fingerprinting with group signatures. In 6th Intl. Conf. on the Theory and Application of Cryptology and Information Security, pages 415-428. Springer LNCS 1976.
  4. Choi, J.-G., Sakurai, K., and Park, J.-H. (2003). Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In 1st Intl. Conf. on Applied Cryptography and Network Security, pages 265-279. Springer LNCS 2846.
  5. Cox, I. J., Killian, J., Leighton, T., and Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 6(12):1673-1687.
  6. Gehrmann, C., Mitchell, C. J., and Nyberg, K. (2004). Manual authentication for wireless devices. Cryptobytes, 7(1):29-37.
  7. Goldwasser, S., Micali, S., and Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208.
  8. Ju, H. S., Kim, H. J., Lee, D. H., and Lim, J. I. (2002). An anonymous buyer-seller watermarking protocol with anonymity control. In 5th Intl. Conf. on Information Security & Cryptology, pages 421-432. Springer LNCS 2587.
  9. Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H. (2004). An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Processing, 13(12):1618-1626.
  10. Memon, N. and Wong, P. W. (2001). A buyer-seller watermarking protocol. IEEE Trans. on Image Processing, 10(4):643-649.
  11. Mitchell, C. J., editor (2005). Trusted Computing. IEE Press, London.
  12. National Institute of Standards and Technology (NIST) (2002). Secure Hash Standard. Federal information processing standards publication (FIPS) 180-2.
  13. Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT'99, pages 223-238. Springer LNCS 1592.
  14. Pfitzmann, B. and Schunter, M. (1996). Asymmetric fingerprinting. In EUROCRYPT'96, pages 84-95. Springer LNCS 1070.
  15. Pfitzmann, B. and Waidner, M. (1997). Anonymous fingerprinting. In EUROCRYPT'97, pages 88-102. Springer LNCS 1233.
  16. Tomsich, P. and Katzenbeisser, S. (2000). Towards a secure and de-centralized digital watermarking infrastructure for the protection of intellectual property. In 1st Intl. Conf. in E-Commerce & Web Technologies, pages 38- 47. Springer LNCS 1875.
  17. Trusted Computing Group (TCG) (2004). TCG Specification Architecture Overview. Version 1.2, The Trusted Computing Group, Portland, Oregon, USA.
Download


Paper Citation


in Harvard Style

Sen Poh G. and Leung A. (2007). AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 319-326. DOI: 10.5220/0002124803190326


in Bibtex Style

@conference{secrypt07,
author={Geong Sen Poh and Adrian Leung},
title={AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={319-326},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002124803190326},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING
SN - 978-989-8111-12-8
AU - Sen Poh G.
AU - Leung A.
PY - 2007
SP - 319
EP - 326
DO - 10.5220/0002124803190326