Browse > Article

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party  

Kwon, Sae-Ran (대림대학 컴퓨터정보계열)
Abstract
An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.
Keywords
Asymmetric Fingerprinting; Watermarking; Anonymity; Man-in-the-middle-attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Proessing, vol.6, pp.1673-1687, Dec.1997.   DOI   ScienceOn
2 B.M Goi, R.C.-W. Phan, Y.Yang, F.Bao, R.H.Deng, and M.U. Siddiqi, "Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity," In: M. Jakobsson, M. Yung, J. Zhou (eds.) ACNS 2004, LNCS 3089, pp.369-382, 2004.
3 C.L.Lei, P.L. Yu, P.L. Tsai, and M.H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE transactions on Image Processing, 13(12), pp.1618-1626, 2004.   DOI   ScienceOn
4 Min-Hua Shao, "A Privacy-preserving buyer-seller watermarking protocol with senti-trust third party." TrustBus 2007, LNCS 4667, pp.44-53, Springer-Verlag, 2007.
5 N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Processing, vol.10, pp.643-649, Apr.2001.   DOI   ScienceOn
6 L. Qian and K. Nahresedt, "Watermarking schemes and protocols for protecting rightful ownership and customer's rights," J. Vis. Commun. Image Representation, vol.9, pp.194-210, Sept.1998.   DOI   ScienceOn
7 B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," Eurocrypt'96, LNCS 1070, pp.84-95, Springer-Verlag, 1996.
8 J.G. Choi, K. Sakurai, and J.H. Park, "Does it need trusted third party? Desing of buyer-seller watermarking protocol without trusted third party," In: J. Zhou M. Yung, Y. Han (eds.) ACNS 2003, LNCS 2846, pp.265-279, 2003.
9 N. R. Wanger, "Fingerprinting," IEEE Symposium on Seurity and Privacy, pp.18-22, 1983.
10 H.S. Ju, H.J. Kim, D.H. Lee, and J.I. Lim, "An anonymous buyer-seller watermarking protocol with anonymity control," In: P.J.Lee, C.H. Lim(eds.) ICISC 2002, LNCS 2587, pp.421-432, 2003.
11 용승림, 이상호, "신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법", 정보과학회논문지 : 시스템 및 이론, 제 34권 제 7호, pp.288-295, 정보과학회 (2007.8).   과학기술학회마을
12 M. Swanson, M. Kobayashi, and A. Tewfik, "Multimedia data embedding and watermarking technologies," Proc. IEEE, vol.86, pp.1064-1087, June 1998.   DOI   ScienceOn