A Web Oriented Watermarking Protocol

This paper presents a watermarking protocol able to solve the well-known “customer-s right problem" and “unbinding problem". In particular, the protocol has been purposely designed to be adopted in a web context, where users wanting to buy digital contents are usually neither provided with digital certificates issued by certification authorities (CAs) nor able to autonomously perform specific security actions. Furthermore, the protocol enables users to keep their identities unexposed during web transactions as well as allows guilty buyers, i.e. who are responsible distributors of illegal replicas, to be unambiguously identified. Finally, the protocol has been designed so that web content providers (CPs) can exploit copyright protection services supplied by web service providers (SPs) in a security context. Thus, CPs can take advantage of complex services without having to directly implement them.




References:
[1] I. Cox, J. Bloom, and M. Miller, Digital Watermarking: Principles &
Practice. Morgan Kaufman, 2001.
[2] F. Bartolini, A. Piva, and M. Barni, "Managing copyright in open
networks," IEEE Internet Computing, vol. 6, no. 3, pp. 18-26, 2002.
[3] M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal
Processing Magazine, vol. 21, no. 2, pp. 28-39, 2004.
[4] L. Qiao and K. Nahrstedt, "Watermarking schemes and protocols for
protecting rightful ownership and customers rights," Journal of Vis.
Commun. Image Representation, vol. 9, no. 9, pp. 194-210, 1998.
[5] N. Memon and P. W. Wong, "A buyer-seller watermarking protocol,"
IEEE Trans. on Image Processing, vol. 10, no. 4, pp. 643-649, 2001.
[6] C. L. Lei, P. L. Yu, et al., "An efficient and anonymous buyer-seller
watermarking protocol," IEEE Trans. on Image Processing, vol. 13,
no. 12, pp. 1618-1626, 2004.
[7] W. Trappe, M. Wu, et al., "Anti-collusion fingerprinting for multimedia,"
IEEE Trans. on Signal Processing, vol. 41, no. 4, pp. 1069-1087, 2003.
[8] M. Wu, W. Trappe, et al., "Collusion-resistant fingerprinting for multimedia,"
IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 15-27,
2004.
[9] K. Gopalakrishnan, "Protocols for watermark verification," IEEE Multimedia,
vol. 8, pp. 66-70, 2001.
[10] S. Katzenbeisser, "On the design of copyright protection protocols for
multimedia distribution using symmetric and public-keywatermarking,"
in Proc. of the 12th Int-l Workshop on Database and Expert Systems
Applications, 2001, pp. 815-819.
[11] F. Hartung, J. K. Su, and B. Girod, "Spread spectrum watermarking:
Malicious attacks and counterattacks," in Security and Watermarking of
Multimedia Contents, ser. Proceedings of SPIE, E. J. Delp and P. W.
Wong, Eds., vol. 3657, 1999, pp. 147-158.
[12] F. Frattolillo and S. D-Onofrio, "Applying web oriented technologies to
implement an adaptive spread spectrum watermarking procedure and a
flexible DRM platform," in Proc. of the 3rd Australasian Information
Security Workshop, ser. Conferences in Research and Practice in Information
Technology, P. Montague, R. Safavi-Naini, R. Buyya, et al., Eds.,
vol. 44, Newcastle, Australia, Feb. 2005, pp. 159-167.
[13] ÔÇöÔÇö, "Implementing a simple but flexible DRM web platform," in Proc.
of the 3rd Int-l Conference on Computing, Communications and Control
Technologies, Austin, Texas, USA, 2005.
[14] ÔÇöÔÇö, "An effective and dynamically extensible DRM web platform,"
in Proc. of the Int-l Conference on High Performance Computing and
Communications, ser. Lecture Notes in Computer Science, L. T. Yang,
O. F. Rana, B. Di Martino, and J. Dongarra, Eds., vol. 3726, Sorrento,
Italy, Sept. 2005.
[15] R. Brunner, F. Cohen, et al., Java Web Services Unleashed. SAMS
Publishing, 2001.
[16] M. Ceccarelli, M. Di Santo, S. D-Onofrio, and F. Frattolillo, "A web
multi-tier platform for adaptively protecting and securely delivering
multimedia contents on the web," in Proc. of the 5th Int-l Workshop on
Image Analysis for Multimedia Interactive Services, Lisbon, Portugal,
2004.