Skip to main content
Log in

A buyer-seller watermarking protocol for digital secondary market

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the digital right management value chain, digital watermarking technology plays a very important role in digital product’s security, especially on its usage tracking and copyrights infringement authentication. However, watermark procedures can only effectively support copyright protection processes if they are applied as part of an appropriate watermark protocol. In this regard, a number of watermark protocols have been proposed in the literature and have been shown to facilitate the use of digital watermarking technology as copyright protection. One example of such protocols is the anonymous buyer-seller watermarking protocol. Although there are a number of protocols that have been proposed in the literature and provide suitable solutions, they are mainly designed as a watermarking protocol for the first-hand market and are unsuitable for second-hand transactions. As the complexity of online transaction increases, so does the size of the digital second-hand market. In this paper, we present a new buyer-seller watermark protocol that addresses the needs of customer’s rights problem in the digital secondary market. The proposed protocol consists of five sub-protocols that cover the registration process, watermarking process for the first, second and third-hand transactions as well as the identification & arbitration processes. This paper provides analysis that compares the proposed protocols with existing state-of-the-arts and shows that it has met not only all the buyer’s and seller’s requirements in the traditional sense but also accommodates the same requirements in the secondary market.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chen C, Chen C, Li D, Chen P (2015) A verifiable and secret buyer-seller watermarking protocol. IETE Tech Rev 32(2):104–113

    Article  Google Scholar 

  2. Cox I, Bloom J, Miller M (2001) Digital watermarking: principles & practice. Morgan Kaufman, San Mateo

    Google Scholar 

  3. Frattolillo F (2007) Watermarking protocol for web context. IEEE Trans Inf Forensics Secur 2(3):350–363

    Article  Google Scholar 

  4. Frattolillo F (2014) Watermarking protocol: problems, challenges and a possible solution. Comput J 58(4):944–960

    Article  Google Scholar 

  5. Frattolillo F (2016) A buyer-friendly and mediated watermarking protocol for web context. ACM Trans Web 10(2):Article 9

    Article  Google Scholar 

  6. Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559

    Article  Google Scholar 

  7. Gentry C (2009) A fully homomorphic encryption scheme. PhD dissertation, Department of Computer Science, Stanford University

  8. Gittleson K (2012) US court to rule on ReDigi’s MP3 digital music resales. http://www.bbc.com/news/technology-19842851

  9. Hu D, Li Q (2009) A secure and practical buyer-seller watermarking protocol. International Conference on Multimedia Information Networking and Security, 105–108, November, 2009

  10. Hu Z, She K, Wang J, Tang J (2014) Game theory based false negative probability of embedded watermark under unintentional and steganalysis attacks. China Commun 11(5):114–123

    Article  Google Scholar 

  11. Huang J, Jeng F, Chen T (2016) A new buyer-seller watermarking protocol without multiple watermarks insertion. Multimed Tools Appl 1–13

  12. Katzenbeisser S (2001) On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. 12th Internationalworkshop on database and expert systems applications 815–819

  13. Khan KM, Malluhi Q (2010) Establishing trust in cloud computing. IT Professional 12(5):20–27

    Article  Google Scholar 

  14. Khan M, Jeoti V, Malik A et al. (2011) A joint watermarking and encryption scheme for DCT based codecs. 17th Asia-pacific conference on communications, Malaysia

  15. Langr D, Tvrdik P (2016) Evaluation criteria for sparse matrix storage formats. IEEE Trans Parallel Distrib Syst 27(2):428–440

    Article  Google Scholar 

  16. Lei CL et al (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans Image Process 13(12):1618–1626

    Article  Google Scholar 

  17. Makbol N, Khoo B, Rassem T (2016) Block-based discrete wavelet transform-singular value decoomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52

    Article  Google Scholar 

  18. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649

    Article  MATH  Google Scholar 

  19. Nematollahi M, Haddad S (2013) An overview of digital speech watermarking. Int J Speech Technol 16(4):471–488

    Article  Google Scholar 

  20. Ochi H, Ota T, Yamaoka A, Watanabe H, Kondo Y, Tokuda N, Taguchi H, Matsumoto T, Kobayashi H, Imai S (2013) Sealed mask ROM wafer with 5 mm magnetic resonant coupling for long-term digial data preservation. IEEE 26th International SOC Conference, 262–266, Erlangen, 4–6 Sep, 2013

  21. Peng Y, Wang C, Fang Y, Li W (2012) Anonymous watermarking protocol for vector spatial data. International Conference on Computer Science & Service System, 2095–2098, Nanjing.

  22. Qiao L, Nahrstedt K (1998) Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J Vis Commun Image Represent 9(3):194–210

    Article  Google Scholar 

  23. Qin C, Chang C, Chiu Y (2014) A novel joint data-hiding and compression scheme based on SMVQ and image Inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  24. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31(C):154–164

    Article  Google Scholar 

  25. Qin C, Chang C, Chen P (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  26. Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323

    Google Scholar 

  27. Rial A, Deng M, Bianchi T, Piva A, Preneel B (2010) A provably secure anonymous buyer-seller watermarking protocol. IEEE Trans Inf Forensics Secur 5(4):920–931

    Article  Google Scholar 

  28. Rial A, Balasch J, Preneel B (2011) A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer. IEEE Trans Inf Forensics Secur 6(1):202–212

    Article  Google Scholar 

  29. Song C, Sudirman S, Merabti M (2012) A robust-adaptive dual image watermarking technique. J Vis Commun Image Represent 23:549–568

    Article  Google Scholar 

  30. Waleed J, Hameed S, Huang D (2014) A robust optimal zero-watermarking technique for secret watermark sharing. Int J Secur Appl 8(5):349–360

    Google Scholar 

  31. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl 75(4):1947–1962

    Article  Google Scholar 

  32. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

  33. Zhang G, Ma Y (2010) Analysis on influence factors of digital preservation sustainability. Inform Sci (Chinese Journal) 28(11):1737–1740

    Google Scholar 

  34. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  35. Zhou W, Bovik AC (2009) Mean square error: love it or leave it? A new look at signal fiedlity measures. IEEE Signal Process Mag 26(1):98–117

    Article  Google Scholar 

  36. Zhou Z, Wang Y, Wu J, Yang C, Sun X (2016) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63

Download references

Acknowledgements

The work was sponsored by Jiangnan University of Science & Technology Young Scholar Grant (No.JUSRP11462); Key Project of Jiangnan University Fund Grant (No. JUSRP51414A); the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunlin Song.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Song, C., Sang, J. & Sudirman, S. A buyer-seller watermarking protocol for digital secondary market. Multimed Tools Appl 77, 225–249 (2018). https://doi.org/10.1007/s11042-016-4247-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4247-8

Keywords

Navigation