and all the purchase transaction information in
the seller's sales database.
The buyer’s participation in the dispute
resolution is not required since the protocol
exploits the existence of the certification
authority (CA) as the only trust anchor between
the buyer and the seller.
The buyer has to contact only one party (the
reseller) in order to complete the purchase
transaction which is considered more
convenient in practice than contacting more
than one party and therefore increases the
protocol's practice applicability.
The protocol has been secured against the man
in the middle attack based on exploiting the
public key cryptography in all the
communication between the different parties
(the seller, the reseller, the buyer and the judge).
The buyer’s dual signature of the (ARG) and
his/her unique watermark (W
B
) has been used to
solve the unbinding problem. For example, if a
malicious seller intentionally transplants an
innocent buyer’s watermark (W
B
) initially
embedded in a copy of certain digital object into
a copy of another digital object provided both
copies are sold to the same innocent buyer, then
a different (ARG
'
) is formulated and hence this
will lead to different buyer's dual signature
(H(H(W
B
)+H(ARG
'
))) and as a result step (5) in
the dispute resolution protocol will fail
declaring the buyer's innocence.
The proposed protocol solves the conspiracy
problem by eliminating the need of the
participation of any untrustworthy third party.
Since the protocol only requires the
participation of the certification authority (CA)
in the dispute resolution which is considered the
only trust anchor between the buyer and the
seller.
4 CONCLUSIONS
In this paper an effective and secure watermarking
protocol for digital rights protection over the second-
hand market has been proposed. The protocol
preserves the customer’s rights and allows an honest
seller to trace a pirated copy to the original buyer
(copy deterrence). In addition, the buyer has to
contact only one party (the reseller) during the
purchase transaction that increases the protocol’s
practice applicability. The protocol has also
supported over the second-hand market that the
buyer is not required to participate in the dispute
resolution which is more convenient in practice.
Furthermore, the protocol is secured against the man
in the middle attack based on the public key
infrastructure (PKI) along with solving the
unbinding and conspiracy problems in effective,
secure and yet convenient manner.
REFERENCES
R. Rivest, A. Shamir and L. Adelman, 1978. “A method
for obtaining digital signatures and public key
cryptosystems”. In Commun. ACM, Vol. 21, pp. 120–
126.
J. D. Cohen and M. J. Fischer, Oct. 21–23, 1985. “A
robust and verifiable cryptographically secure election
scheme (extended abstract)”. In Proc. IEEE 26th
Annu. Symp. Foundations Computer Science,
Portland, OR, pp. 372–382.
D. Stinson, 1995. In Cryptography: Theory and Practice.
Boca Raton, FL: CRC.
L.Qian and K.Nahrstedt, Seprember 1998. “Watermarking
schemes and protocols for protecting rightful
ownership and customer’s rights”. In J. Visual
Commun. Image Represent., Vol. 9, pp. 194–210.
Memon N. and Wong P.W., 2001. “A buyer–seller
watermarking protocol”. In IEEE Trans. Image
Process., Vol. 10, No. 4, pp. 643–649.
S. Katzenbeisser, Sept. 2001. “On the design of copyright
protection protocols for multimedia distribution using
symmetric and public-key watermarking”. In Proc.
12th Int. Workshop Database and Expert Systems
Applicat., pp. 815–819.
Ju, H.S., Kim, H.J., Lee, D.H., and Lim, J.I., 2002. “An
anonymous buyer–seller watermarking protocol with
anonymity control”, In Lee, P.J., and Lim, C.H. (Eds):
Proc. ICISC, LNCS 2587, pp. 421–432.
Shing-Chi Cheung and Hanif Curreem, 2002. “Rights
Protection for Digital Contents Redistribution Over
the Internet”. In COMPSAC 2002: 105-110.
R. Housley, W. Polk, W. Ford, and D. Solo, Apr. 2002.
“Internet X.509 public key infrastructure certificate
and certificate revocation list (CRL) profile”. In RFC
3280.
Chin-Chen Chang, Chi-Yien Chung, 2003. “An Enhanced
Buyer Seller Watermarking Protocol“. In Proceedings
of ICCT.
Lei C.-L., Yu P.-L., Tsai P.-L., and Chan M.-H., 2004.
“An efficient and anonymous buyer–seller
watermarking protocol”. In IEEE Trans. Image
Process, Vol. 13, No. 12, pp. 1618–1626.
J.Zhang, W.Kou and K.Fan, March 2006. “Secure buyer-
seller watermarking protocol”. In IEE Proc.-Inf.
Secur., Vol. 153, No. 1.
SECRYPT 2007 - International Conference on Security and Cryptography
268