Watermarking Protocols: A Short Guide for Beginners
Abstract
:1. Introduction and Motivations
2. Requirements
2.1. Usability Requirements
2.1.1. Buyer Problem
2.1.2. Content Provider Problem
2.1.3. Multiple Negotiation Problem
2.2. Security Requirements
2.2.1. Piracy Tracing Problem
2.2.2. Customer’s Right Problem
2.2.3. Unbinding Problem
2.2.4. Dispute Resolution Problem
2.2.5. Conspiracy Problem
2.2.6. Ambiguity Problem
3. Security Primitives
3.1. Zero-Knowledge Proof
3.2. Homomorphic Encryption
3.3. Commutative Encryption
3.4. Joint Watermarking
4. Performance Issues
5. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
DRM | Digital Rights Management |
TTP | Trusted Third Party |
CA | Certification Authority |
WCA | Watermark Certification Authority |
LUT | Look-Up Table |
DCT | Cosine Discrete Transform |
QIM | Quantization Index Modulation |
References
- Frattolillo, F.; Landolfi, F. Designing a DRM System. In Proceedings of the 4th International Conference on Information Assurance and Security, Naples, Italy, 8–10 September 2008; pp. 221–226. [Google Scholar]
- Zhang, Z.; Pei, Q.; Ma, J.; Yang, L. Security and Trust in Digital Rights Management: A Survey. Int. J. Netw. Secur. 2009, 9, 247–263. [Google Scholar]
- Srinivas, T.; Narasimha, V.; Puroshothammam, M. Survey on design challenges and analysis of service architecture of DRM. In Proceedings of the 2017 International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 11–12 May 2017; pp. 682–686. [Google Scholar] [CrossRef]
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: Burlington, MA, USA, 2007. [Google Scholar]
- Liu, K.J.R.; Trappe, W.; Wang, Z.J.; Wu, M.; Zhao, H. Multimedia Fingerprinting Forensics for Traitor Tracing; Hindawi Publishing Corporation: New York, NY, USA, 2005. [Google Scholar]
- Gopalakrishnan, K.; Memon, N.; Vora, P.L. Protocols for watermark verification. IEEE Multimed. 2001, 8, 66–70. [Google Scholar] [CrossRef] [PubMed]
- Memon, N.; Wong, P.W. A buyer-seller watermarking protocol. IEEE Trans. Image Process. 2001, 10, 643–649. [Google Scholar] [CrossRef]
- Lei, C.L.; Yu, P.L.; Tsai, P.L.; Chan, M.H. An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. Image Process. 2004, 13, 1618–1626. [Google Scholar] [CrossRef] [PubMed]
- Frattolillo, F. Watermarking protocols: An excursus to motivate a new approach. Int. J. Inf. Secur. 2018, 17, 587–601. [Google Scholar] [CrossRef]
- Frattolillo, F. A multiparty watermarking protocol for cloud environments. J. Inf. Secur. Appl. 2019, 47, 246–257. [Google Scholar] [CrossRef]
- Frattolillo, F. Blockchain and Cloud to Overcome the Problems of Buyer and Seller Watermarking Protocols. Appl. Sci. 2021, 11, 12028. [Google Scholar] [CrossRef]
- Dong, X.; Zhang, W.; Hu, X.; Liu, K. A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images. Int. J. Digit. Crime Forensics 2018, 10, 118–139. [Google Scholar] [CrossRef]
- Kumar, A. A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi–trusted third party for copy deterrence and privacy preserving. Multimed. Tools Appl. 2022, 81, 21417–21448. [Google Scholar] [CrossRef]
- Kumar, A.; Kumar, M.; Verma, S.; Kavita.; Jhanjhi, N.; Ghoniem, R. Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism. Symmetry 2022, 14, 2441. [Google Scholar] [CrossRef]
- Rannenberg, K.; Royer, D.; Deuker, A. The Future of Identity in the Information Society—Challenges and Opportunities; Springer: Berlin, Germany, 2009. [Google Scholar]
- Barni, M.; Bartolini, F. Data Hiding for Fighting Piracy. IEEE Signal Process. Mag. 2004, 21, 28–39. [Google Scholar] [CrossRef]
- Song, C.; Wang, H.; Zhang, W.; Sudirman, S.; Zhu, H. A Blockchain Based Buyer-seller Watermark Protocol with Trustless Third Party. Recent Adv. Electr. Electron. Eng. 2020, 13, 942–950. [Google Scholar] [CrossRef]
- Hartung, F.; Su, J.K.; Girod, B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks. In Security and Watermarking of Multimedia Contents, Proceedings of the Electronic Imaging ’99, San Jose, CA, USA, 23–29 January 1999; Delp, E.J., Wong, P.W., Eds.; SPIE: Bellingham, WA, USA, 1999; Volume 3657, pp. 147–158. [Google Scholar]
- Katzenbeisser, S.; Veith, H. Securing Symmetric Watermarking Schemes Against Protocol Attacks. In Security and Watermarking of Multimedia Contents IV, Proceedings of the Electronic Imaging, 2002, San Jose, CA, USA, 19–25 January 2002; Delp, E.J., Wong, P.W., Eds.; SPIE: Bellingham, WA, USA, 2002; Volume 4675, pp. 260–268. [Google Scholar]
- Pfitzmann, B.; Waidner, M. Anonymous fingerprinting. In Advances in Cryptology–Eurocrypt ‘97, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Konstanz, Germany, 11–15 May 1997; Lecture Notes in Computer Science; Fumy, W., Ed.; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1233, pp. 88–102. [Google Scholar]
- Bellare, M.; Goldreich, O. On defining proofs of knowledge. In Advances in Cryptology—CRYPTO’ 92, Proceedings of the 12th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 1992; Lecture Notes in Computer Science; Brickell, E.F., Ed.; Springer: Berlin/Heidelberg, Germany, 1992; Volume 740, pp. 390–420. [Google Scholar]
- Camenisch, J.; Stadler, M. Proof Systems for General Statements about Discrete Logarithms; Technical Report TR 260; Institute for Theoretical Computer Science, ETH: Zurich, Switzerland, 1997. [Google Scholar]
- Poupard, G.; Stern, J. Fair Encryption of RSA Keys. In Advances in Cryptology—EUROCRYPT 2000, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Lecture Notes in Computer Science; Preneel, B., Ed.; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1807, pp. 172–189. [Google Scholar]
- Camenisch, J.; Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology—CRYPTO 2003, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2003; Lecture Notes in Computer Science; Boneh, D., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2729, pp. 126–144. [Google Scholar]
- Damgård, I.; Jurik, M. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In Public Key Cryptography, Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, Cheju Island, Republic of Korea, 13–15 February 2001; Lecture Notes in Computer Science; Kim, K., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 1992, pp. 119–136. [Google Scholar]
- Rial, A.; Deng, M.; Bianchi, T.; Piva, A.; Preneel, B. A Provably Secure Anonymous Buyer—Seller Watermarking Protocol. IEEE Trans. Inf. Forensics Secur. 2010, 5, 920–931. [Google Scholar] [CrossRef]
- Fontaine, C.; Galand, F. A Survey of Homomorphic Encryption for Nonspecialists. Eurasip J. Inf. Secur. 2007, 2007, 013801. [Google Scholar] [CrossRef]
- Boneh, D.; Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 1998, 44, 1897–1905. [Google Scholar] [CrossRef]
- Trappe, W.; Wu, M.; Wang, Z.J.; Liu, K.J.R. Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 2003, 41, 1069–1087. [Google Scholar] [CrossRef]
- Zhao, H.V.; Liu, K.J.R. Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. IEEE Trans. Inf. Forensics Secur. 2006, 1, 440–456. [Google Scholar] [CrossRef]
- Pehlivanoglu, S. An Asymmetric Fingerprinting Code for Collusion-resistant Buyer-seller Watermarking. In IH&MMSec ’13: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 17–19 June 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 35–44. [Google Scholar]
- Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 2019, 51, 79. [Google Scholar] [CrossRef]
- ElGamal, T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Goldwasser, S.; Micali, S. Probabilistic encryption & how to play mental poker keeping secret all partial information. In Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, CA, USA, 5–7 May 1982; pp. 365–377. [Google Scholar]
- Paillier, P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology—EUROCRYPT ′99, Proceedings of the Eurocrypt ′99, International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1592, pp. 223–238. [Google Scholar]
- Kuribayashi, M. On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol. EURASIP J. Info. Security 2010, 2010, 694797. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues. IEEE Signal Process. Mag. 2013, 30, 87–96. [Google Scholar] [CrossRef]
- Chen, B.; Wornell, G. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 2001, 47, 1423–1443. [Google Scholar] [CrossRef]
- Kuribayashy, M.; Tanaka, H. Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Trans. Image Process. 2005, 14, 2129–2139. [Google Scholar] [CrossRef]
- Prins, J.P.; Erkin, Z.; Lagendijk, R.L. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. 2007, 2007, 031340. [Google Scholar] [CrossRef]
- Shamir, A.; Rivest, R.L.; Adleman, L.M. Mental Poker. In The Mathematical Gardner; Klarner, D.A., Ed.; Springer: Boston, MA, USA, 1981; pp. 37–43. [Google Scholar]
- Zhao, W.; Varadharajan, V.; Mu, Y. A Secure Mental Poker Protocol over the Internet. In Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, Adelaide, Australia, 1 February 2003; pp. 105–109. [Google Scholar]
- Huang, K.; Tso, R. A Commutative Encryption Scheme based on ElGamal Encryption. In Proceedings of the International Conference on Information Security and Intelligent Control, Yunlin, Taiwan, 14–16 August 2012; pp. 156–159. [Google Scholar]
- Huang, K.; Tso, R.; Chen, Y.C. One-time-commutative public key encryption. In Proceedings of the Computing Conference 2017, London, UK, 18–20 July 2017; pp. 814–818. [Google Scholar]
- Samanthula, B.K.; Elmehdwi, Y.; Howser, G.; Madria, S. A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. 2015, 48, 196–212. [Google Scholar] [CrossRef]
- Shafagh, H.; Hithnawi, A.; Burkhalter, L.; Fischli, P.; Duquennoy, S. Secure sharing of partially homomorphic encrypted IOT data. In Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems, Delft, The Netherlands, 5–8 November 2017; pp. 1–14. [Google Scholar]
- Derler, D.; Ramacher, S.; Slamanig, D. Homomorphic proxy reauthenticators and applications to verifiable multi-user data aggregation. In Proceedings of the International Conference on Financial Cryptography and Data Security, Sliema, Malta, 3–7 April 2017; pp. 124–142. [Google Scholar]
- Gao, C.; Cheng, Q.; Li, X.; Xia, S. Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust. Comput. 2019, 22, 1655–1663. [Google Scholar] [CrossRef]
- Yu, B.; Zhang, C.; Li, W. File matching based on secure authentication and proxy homomorphic re-encryption. In Proceedings of the 11th International Conference on Machine Learning and Computing, Zhuhai, China, 22–24 February 2019; pp. 472–476. [Google Scholar]
- Choi, J.G.; Sakurai, K.; Park, J.H. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In Applied Cryptography and Network Security, Proceedings of the 1st International Conference on Applied Cryptography and Network Security, Kunming, China, 16–19 October 2003; Lecture Notes in Computer Science; Zhou, J., Yung, M., Han, Y., Eds.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2846, pp. 265–279. [Google Scholar]
- Wang, C.; Leung, H.F.; Cheung, S.C.; Wang, Y. Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. In Proceedings of the 18th International Conference on Advanced Information Networking and Application, Fukuoka, Japan, 29–31 March 2004. [Google Scholar]
- Jeng, F.J.; Huang, J.C.; Chen, T.H. An Improved Anonymous Buyer-Reseller Watermarking Protocol. Int. J. Netw. Secur. 2016, 18, 728–735. [Google Scholar]
- Celik, M.U.; Lemma, A.N.; Katzenbeisser, S.; van der Veen, M. Lookup table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 2008, 3, 475–487. [Google Scholar] [CrossRef]
- Katzenbeisser, S.; Lemma, A.; Celik, M.U.; van der Veen, M.; Maas, M. A Buyer—Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 2008, 3, 783–786. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A. TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1557–1568. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A.; Shullani, D. Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. Eurasip J. Inf. Secur. 2015, 2015, 6. [Google Scholar] [CrossRef]
- Marshall, T., Jr. Coding of real-number sequences for error correction: A digital signal processing problem. IEEE J. Sel. Areas Commun. 1984, 2, 381–392. [Google Scholar] [CrossRef]
- Wang, Z.; Giannakis, G.B. Complex-field coding for OFDM over fading wireless channels. IEEE Trans. Inf. Theory 2003, 49, 707–720. [Google Scholar] [CrossRef]
- Deng, M.; Bianchi, T.; Piva, A.; Preneel, B. An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, 7–8 September 2009; pp. 9–18. [Google Scholar]
- Celik, M.U.; Lemma, A.N.; Katzenbeisser, S.; van der Veen, M. Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables. In Proceedings of the 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, HI, USA, 15–20 April 2007; Volume 2, pp. II–153–II–156. [Google Scholar]
- Bianchi, T.; Piva, A. TTP-free asymmetric fingerprinting protocol based on client side embedding. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Florence, Italy, 4–9 May 2014; pp. 3987–3991. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Frattolillo, F. Watermarking Protocols: A Short Guide for Beginners. Future Internet 2023, 15, 163. https://doi.org/10.3390/fi15050163
Frattolillo F. Watermarking Protocols: A Short Guide for Beginners. Future Internet. 2023; 15(5):163. https://doi.org/10.3390/fi15050163
Chicago/Turabian StyleFrattolillo, Franco. 2023. "Watermarking Protocols: A Short Guide for Beginners" Future Internet 15, no. 5: 163. https://doi.org/10.3390/fi15050163
APA StyleFrattolillo, F. (2023). Watermarking Protocols: A Short Guide for Beginners. Future Internet, 15(5), 163. https://doi.org/10.3390/fi15050163