Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.12.1402

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol  

Seong, Teak-Young (Interdisciplinary Program of Information Security, Pukyong National University)
Kwon, Ki-Chang (Dept. of IT Cooperative System, Gyeongbuk Provincial College)
Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University)
Moon, Kwang-Seok (Dept. of Electronics Engineering, Pukyong National University)
Kwon, Ki-Ryong (Interdisciplinary Program of Information Security, Pukyong National University)
Publication Information
Abstract
Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.
Keywords
Intellectual Property; Buyer-seller Watermarking Protocol; Security; Cryptographic Protocol; Watermarking;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M.D. Swanson, M. Kobayashi, and A.H. Tewfik, "Multimedia Data Embedding and Watermarking Technologies," Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, 1998.   DOI   ScienceOn
2 C.I. Podilchuk and W. Zeng, "Image-adaptive Watermarking using Visual Models," IEEE Journal on Selected Areas Communications, Vol. 16, Issue 4, pp. 525-539, 1998.   DOI   ScienceOn
3 I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, 1997.   DOI   ScienceOn
4 Birgit Pfitzmann, "Trials of Traced Traitors," Proceeding of the First International Workshop on Information Hiding, pp. 49-64, 1996.
5 B. Pfitzmann and M. Schunter, "Asymmetric Fingerprinting," Advances in Cryptology, EUROCRYPT'96, LNCS 1592, pp. 150-164, 1996.
6 B. Pfitzmann and M. Waidner, "Anonymous Fingerprinting," Advances in Cryptology, EUROCRYPT'97, LNCS 1233, pp. 88-102, 1997.
7 N. Memon and P.W. Wong, "A Buyer-seller Watermarking Protocol," IEEE Transactions on Image Processing, Vol. 10, No. 4, pp. 643-649, 2001.   DOI   ScienceOn
8 C.L. Lei and M.H. Chan, "An Efficient Anonymous Buyer-Seller Watermarking Protocol," IEEE Transactions on Image Processing, Vol. 13, No. 12, pp. 1618-1626, 2004.   DOI   ScienceOn
9 M. Kuribayashi and H. Tanaka, "A Watermarking Scheme Applicable for Fingerprinting Protocol," Proceeding of International Workshop on Digital Watermarking, IWDW 2003, LNCS 2939, pp. 532-543, 2004.
10 K.G. Kwon, J.H. Lee, S.H. Lee, and K.R. Kwon, "POCS based Digital Watermarking in Buyer-seller Watermarking Protocol," Journal of Korea Multimedia Society, Vol. 10, No. 5, pp. 569-582, 2007.
11 S.H. Lee, S.G. Kwon, and K.R. Kwon, "Geometric Multiple Watermarking Scheme for Mobile 3D Content based on Anonymous Buyer-seller Watermarking Protocol," Journal of Korea Multimedia Society, Vol. 12, No. 2, pp. 244-256, 2009.   과학기술학회마을
12 E.J. Goh, Encryption Schemes from Bilinear Maps, Doctor's Thesis of Stanford University of Computer Science, 2007.
13 M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An Efficient Buyer-Seller Watermarking Protocol based on Composite Signal Representation," Proceedings of the 11th ACM Workshop on Multimedia and Security, ACM MM&Sec., pp. 9-18, 2009.
14 V.V. Das and J.F. Rahman, "An Enhanced Privacy Preserving Buyer-seller Protocol for Anonymous Transaction," ACEEE International Journal on Communication, Vol. 1, No. 2, pp. 57-61, 2010.
15 A. Rail, J. Balasch, and B. Preneel, "A Privacy-preserving Buyer.seller Watermarking Protocol based on Priced Oblivious Transfer," IEEE Transactions On Information Forensics and Security, Vol. 6, No. 1, pp. 202-212, 2011.   DOI   ScienceOn
16 S. Wu and Q. Pu, "Comments on a Buyerseller Watermarking Protocol for Large Scale Networks," International Journal of Network Security, Vol. 14, No. 1, pp. 53-58, 2012.
17 Bjorn Terelius, "Towards Transferable Watermarks in Buyer-seller Watermarking Protocols," IEEE International Workshop on Information Forensics and Security, pp. 197-202, 2013.
18 F. Guo, Y. Mu, and W. Susilo, "Subset Membership Encryption and its Applications to Oblivious Transfer," IEEE Transactions on Information Forensics and Security, Vol. 9, No. 7, pp. 1098-1107, 2014.   DOI