must provide the following functions:
1. Initialize. Lets the originator configure the DTP
and prepare the data for the protocol. The required
keys are also generated by this function.
2. Send. If data should be forwarded to the next au-
thorized receiver, this function must be used. It
sets up a secure communication channel and sends
encrypted data.
3. Receive. Processes the received encrypted data.
If the data are in good condition, the watermarked
plaintext and encrypted storage data are output.
4. Evidence-TD. Generates the non-repudiation to-
ken based on the tracking data accompanying the
protected data containing M.
5. Evidence-WM. Generates the token based on the
digital watermark which has been inserted into the
plaintext message.
5 CONCLUSIONS
With the non-repudiation of forwarding service, con-
fidential data can be tracked via multiple recipients.
Evidence can be generated to prove the whole way
of protected data. The service is split into two parts:
The first part relies on a security module and the sec-
ond part inserts digital watermarks into the plaintext
that output to the recipient.
The data processing part provides a high level of se-
curity. The user is not able to access the confidential
data unless the security module accepts the received
data as valid. The security services of peer entity au-
thentication, non-repudiation of origin, data integrity
and access control are provided. The user is not in
possession of any private or secret key. Instead, these
keys are managed by the security module.
In future work, the key management must be de-
scribed and information about secure key storage and
distribution must be given. Moreover, legal aspects
of the NRFS should be analyzed. The requirements
that are necessary to make the non-repudiation token
valid evidences must be pointed out. Due to the re-
quired computational power of digital watermarking
algorithms, an appropriate security module must be
found. Finally, that module should provide the ser-
vice primitives described in this paper.
ACKNOWLEDGEMENTS
This work is funded by the German Research Foun-
dation (DFG) as part of the research training group
GRK 1564 - ’Imaging New Modalities’.
REFERENCES
Barg, E., Blakley, G. R., and Kabatiansky, G. A. (2003).
Digital fingerprinting codes: Problem statements,
constructions, identification of traitors. In IEEE
Transactions on Information Theory Vol. 49, pages
852–865.
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J.,
and Kalker, T. (2008). Digital Watermarking and
Steganography. Elsevier, second edition edition.
Ford, W. (1994). Computer Communications Security:
Principles, Standard Protocols and Techniques. Pren-
tice Hall, first edition edition.
INDICARE Project (2006). Consumer’s guide to digital
rights management.
ISO/IEC 10181-4 (1997). Information technology - Open
Systems Interconnection - Security frameworks for
open systems: Non-repudiation framework. Interna-
tional Organization for Standardization.
ISO/IEC 13888-1 (2009). Information technology - Secu-
rity techniques - Non-repudiation - Part 1: General.
International Organization for Standardization.
ISO/IEC 13888-2 (2010). Information technology - Security
techniques - Non-repudiation - Part 2: Mechanisms
using symmetric techniques. International Organiza-
tion for Standardization.
ISO/IEC 13888-3 (2009). Information technology - Security
techniques - Non-repudiation - Part 3: Mechanisms
using asymmetric techniques. International Organiza-
tion for Standardization.
Kremer, S., Markowitch, O., and Zhou, J. (2002). An inten-
sive survey of fair non-repudiation protocols. In Com-
puter Communications Vol. 25, pages 1606–1621.
Liu, R., Trappe, W., Wang, J., Wu, M., and Zhao, H. (2005).
Multimedia Fingerprinting Forensics for Traitor Trac-
ing. Hindawi Publishing Corporation.
RFC 4949 (2007). Internet Security Glossary, Version 2.
Network Working Group.
RFC 5280 (2008). Internet X.509 Public Key Infrastruc-
ture Certificate and Certificate Revocation List (CRL)
Profile. Network Working Group.
Scheidemann, V. (2008). Endpoint security: Data loss pre-
vention.
Schick, R. and Ruland, C. (2011a). Data leakage tracking
- non-repudiation of forwarding. In Communications
in Computer and Information Science Vol. 251, pages
163–173.
Schick, R. and Ruland, C. (2011b). Document tracking - on
the way to a new security service. In IEEE Conference
on Network and Information Systems Security, pages
89–93.
Schneier, B. (2001). The futility of digital copy prevention.
Wang, Y., Doherty, J. F., and van Dyck, R. (2001). A water-
marking algorithm for fingerprinting intelligence im-
ages. In John Hopkins University, pages 21–24.
Zhou, J. and Gollmann, D. (1996). A fair non-repudiation
protocol. In IEEE Symposium on Security and Pri-
vacy, pages 55–61.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
390