This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.
[1] I. Cox, J. Bloom, and M. Miller, Digital Watermarking: Principles &
Practice. Morgan Kaufman, 2001.
[2] F. Bartolini, A. Piva, and M. Barni, "Managing copyright in open
networks," IEEE Internet Computing, vol. 6, no. 3, pp. 18-26, 2002.
[3] M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal
Processing Magazine, vol. 21, no. 2, pp. 28-39, 2004.
[4] L. Qiao and K. Nahrstedt, "Watermarking schemes and protocols for
protecting rightful ownership and customers rights," Journal of Vis.
Commun. Image Representation, vol. 9, no. 9, pp. 194-210, 1998.
[5] N. Memon and P. W. Wong, "A buyer-seller watermarking protocol,"
IEEE Trans. on Image Processing, vol. 10, no. 4, pp. 643-649, 2001.
[6] C. L. Lei, P. L. Yu, et al., "An efficient and anonymous buyer-seller
watermarking protocol," IEEE Trans. on Image Processing, vol. 13,
no. 12, pp. 1618-1626, 2004.
[7] W. Trappe, M. Wu, et al., "Anti-collusion fingerprinting for multimedia,"
IEEE Trans. on Signal Processing, vol. 41, no. 4, pp. 1069-1087, 2003.
[8] M. Wu, W. Trappe, et al., "Collusion-resistant fingerprinting for multimedia,"
IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 15-27,
2004.
[9] K. Gopalakrishnan, "Protocols for watermark verification," IEEE Multimedia,
vol. 8, pp. 66-70, 2001.
[10] S. Katzenbeisser, "On the design of copyright protection protocols for
multimedia distribution using symmetric and public-keywatermarking,"
in Proc. of the 12th Int-l Workshop on Database and Expert Systems
Applications, 2001, pp. 815-819.
[11] F. Hartung, J. K. Su, and B. Girod, "Spread spectrum watermarking:
Malicious attacks and counterattacks," in Security and Watermarking of
Multimedia Contents, ser. Proceedings of SPIE, E. J. Delp and P. W.
Wong, Eds., vol. 3657, 1999, pp. 147-158.
[12] F. Frattolillo and S. D-Onofrio, "Applying web oriented technologies to
implement an adaptive spread spectrum watermarking procedure and a
flexible DRM platform," in Proc. of the 3rd Australasian Information
Security Workshop, ser. Conferences in Research and Practice in Information
Technology, P. Montague, R. Safavi-Naini, R. Buyya, et al., Eds.,
vol. 44, Newcastle, Australia, Feb. 2005, pp. 159-167.
[13] ÔÇöÔÇö, "Implementing a simple but flexible DRM web platform," in Proc.
of the 3rd Int-l Conference on Computing, Communications and Control
Technologies, Austin, Texas, USA, 2005.
[14] ÔÇöÔÇö, "An effective and dynamically extensible DRM web platform,"
in Proc. of the Int-l Conference on High Performance Computing and
Communications, ser. Lecture Notes in Computer Science, L. T. Yang,
O. F. Rana, B. Di Martino, and J. Dongarra, Eds., vol. 3726, Sorrento,
Italy, Sept. 2005.
[15] R. Brunner, F. Cohen, et al., Java Web Services Unleashed. SAMS
Publishing, 2001.
[16] M. Ceccarelli, M. Di Santo, S. D-Onofrio, and F. Frattolillo, "A web
multi-tier platform for adaptively protecting and securely delivering
multimedia contents on the web," in Proc. of the 5th Int-l Workshop on
Image Analysis for Multimedia Interactive Services, Lisbon, Portugal,
2004.
[1] I. Cox, J. Bloom, and M. Miller, Digital Watermarking: Principles &
Practice. Morgan Kaufman, 2001.
[2] F. Bartolini, A. Piva, and M. Barni, "Managing copyright in open
networks," IEEE Internet Computing, vol. 6, no. 3, pp. 18-26, 2002.
[3] M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal
Processing Magazine, vol. 21, no. 2, pp. 28-39, 2004.
[4] L. Qiao and K. Nahrstedt, "Watermarking schemes and protocols for
protecting rightful ownership and customers rights," Journal of Vis.
Commun. Image Representation, vol. 9, no. 9, pp. 194-210, 1998.
[5] N. Memon and P. W. Wong, "A buyer-seller watermarking protocol,"
IEEE Trans. on Image Processing, vol. 10, no. 4, pp. 643-649, 2001.
[6] C. L. Lei, P. L. Yu, et al., "An efficient and anonymous buyer-seller
watermarking protocol," IEEE Trans. on Image Processing, vol. 13,
no. 12, pp. 1618-1626, 2004.
[7] W. Trappe, M. Wu, et al., "Anti-collusion fingerprinting for multimedia,"
IEEE Trans. on Signal Processing, vol. 41, no. 4, pp. 1069-1087, 2003.
[8] M. Wu, W. Trappe, et al., "Collusion-resistant fingerprinting for multimedia,"
IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 15-27,
2004.
[9] K. Gopalakrishnan, "Protocols for watermark verification," IEEE Multimedia,
vol. 8, pp. 66-70, 2001.
[10] S. Katzenbeisser, "On the design of copyright protection protocols for
multimedia distribution using symmetric and public-keywatermarking,"
in Proc. of the 12th Int-l Workshop on Database and Expert Systems
Applications, 2001, pp. 815-819.
[11] F. Hartung, J. K. Su, and B. Girod, "Spread spectrum watermarking:
Malicious attacks and counterattacks," in Security and Watermarking of
Multimedia Contents, ser. Proceedings of SPIE, E. J. Delp and P. W.
Wong, Eds., vol. 3657, 1999, pp. 147-158.
[12] F. Frattolillo and S. D-Onofrio, "Applying web oriented technologies to
implement an adaptive spread spectrum watermarking procedure and a
flexible DRM platform," in Proc. of the 3rd Australasian Information
Security Workshop, ser. Conferences in Research and Practice in Information
Technology, P. Montague, R. Safavi-Naini, R. Buyya, et al., Eds.,
vol. 44, Newcastle, Australia, Feb. 2005, pp. 159-167.
[13] ÔÇöÔÇö, "Implementing a simple but flexible DRM web platform," in Proc.
of the 3rd Int-l Conference on Computing, Communications and Control
Technologies, Austin, Texas, USA, 2005.
[14] ÔÇöÔÇö, "An effective and dynamically extensible DRM web platform,"
in Proc. of the Int-l Conference on High Performance Computing and
Communications, ser. Lecture Notes in Computer Science, L. T. Yang,
O. F. Rana, B. Di Martino, and J. Dongarra, Eds., vol. 3726, Sorrento,
Italy, Sept. 2005.
[15] R. Brunner, F. Cohen, et al., Java Web Services Unleashed. SAMS
Publishing, 2001.
[16] M. Ceccarelli, M. Di Santo, S. D-Onofrio, and F. Frattolillo, "A web
multi-tier platform for adaptively protecting and securely delivering
multimedia contents on the web," in Proc. of the 5th Int-l Workshop on
Image Analysis for Multimedia Interactive Services, Lisbon, Portugal,
2004.
@article{"International Journal of Information, Control and Computer Sciences:57508", author = "Franco Frattolillo and Salvatore D'Onofrio", title = "A Web Oriented Watermarking Protocol", abstract = "This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.", keywords = "Copyright protection, digital rights management, watermarkingprotocols.", volume = "1", number = "7", pages = "2088-6", }