Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Institutional Repository

Please use this identifier to cite or link to this item: https://dspace.lboro.ac.uk/2134/8158

Title: Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents
Authors: Phan, Raphael C.-W.
Goi, Bok-Min
Poh, Geong-Sen
Kim, Jongsung
Keywords: Security systems
Trustworthy applications
Content protection
Digital rights protection
Watermarking and fingerprinting protocol
Unbinding property
Secret sharing
Issue Date: 2011
Publisher: © Springer
Citation: PHAN, R.C.-W....et al., 2011. Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wireless Personal Communications, 56(1), pp. 73-83
Abstract: In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of security is a major concern. Security in this setting encompasses both in the interest of the human users as well as their information and objects that they own. A typical kind of transaction interaction among users and/or machines in these environments is that of exchanging digital objects via purchases and/or ownership transfers, e.g. someone buying a song from iTunes via his iPhone, or downloading either bought or rented movies onto a portable DVD player. Here, there is a need to provide trustworthy protection of the rights of both parties; i.e. the seller’s copyright needs to be protected against piracy, while on the other hand it has been highlighted in literature the need to protect innocent buyers from being framed. Indeed, if either party cannot be assured that his rights are protected when he is involved in transactions within such environments, he would shy away and instead prefer for instance the more conventional non-digital means of buying and selling. And therefore without active participation from human users and object owners it is difficult to fully kick off the actual realization of intelligent environments. Zhang et al. recently proposed a buyer–seller watermarking protocol without a trusted third party based on secret sharing. While it is a nice idea to eliminate the need of a trusted third party by distributing secret shares between the buyer and the seller such that neither party has knowledge of the fingerprint embedded in a content, we show that it is possible for a buyer to remove his part of the fingerprint from the content he bought. This directly disproves the piracy tracing property claimed by the protocol. In fact, since piracy tracing is one of the earliest security applications of watermarking schemes, it raises doubts as to the soundness of the design of this protocol.
Description: The original publication is available at www.springerlink.com
Version: Accepted for publication
DOI: 10.1007/s11277-009-9876-z
URI: https://dspace.lboro.ac.uk/2134/8158
Publisher Link: http://dx.doi.org/10.1007/s11277-009-9876-z
ISSN: 0929-6212
Appears in Collections:Published Articles (Mechanical, Electrical and Manufacturing Engineering)

Files associated with this item:

File Description SizeFormat
phan2.pdf203.18 kBAdobe PDFView/Open


SFX Query

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.