Abstract
In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer's watermark which was chosen by the watermark certificate center (WCC), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks.
Original language | English |
---|---|
Title of host publication | Embedded and Ubiquitous Computing - EUC 2005 Workshops |
Subtitle of host publication | UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings |
Pages | 936-944 |
Number of pages | 9 |
DOIs | |
Publication status | Published - 2005 |
Externally published | Yes |
Event | IFIP International Symposium on Network-Centric Ubiquitous Systems 2005 - Nagasaki, Japan Duration: 6 Dec 2005 → 9 Dec 2005 https://link.springer.com/book/10.1007/11596042?page=5#toc (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 3823 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | IFIP International Symposium on Network-Centric Ubiquitous Systems 2005 |
---|---|
Abbreviated title | NCUS 2005 |
Country/Territory | Japan |
City | Nagasaki |
Period | 6/12/05 → 9/12/05 |
Internet address |
Keywords
- Buyer-Seller Watermarking Protocol
- Copyright Protection
- Cryptanalysis
- Digital Watermarking