Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection

Bok Min Goi, Raphael C.W. Phan, Heari Teik Chuah

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Abstract

The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including multimedia services in real time from the comfort of their homes e.g. payTV and interactive TV, streaming audiovisuals, video conferencing and video phones, interactive gaming and online merchandising. With this vast amount of multimedia content being distributed in the environment, there is a need to provide protection for the content from piracy and illegal duplication, which is an important security issue if the UE is to gain popularity and widespread usage. One method to provide content protection and tracing of illegal duplications is using buyer-seller watermarking protocols. In particular, owner-specific marks are embedded into the content to allow content protection and buyer-specific marks are embedded to trace illegal duplications. Two such protocols were independently proposed by Chang and Chung, and Cheung et al., at ICCT 2003 and HICSS 2004, respectively. We show that both the seller's and buyer's rights are not protected in both protocols and therefore the protocols fail to provide even the most basic security requirement of buyer-seller protocols. It is important that these protocols not be deployed for securing UE, but to undergo redesign and thorough security analysis before being reconsidered.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings
PublisherSpringer
Pages951-960
Number of pages10
EditionPART 1
ISBN (Print)9783540744689
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventInternational Conference on Computational Science and Applications 2007 - Kuala Lumpur, Malaysia
Duration: 26 Aug 200729 Aug 2007
https://link.springer.com/book/10.1007/978-3-540-74472-6 (Proceedings)

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume4705 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Computational Science and Applications 2007
Abbreviated titleICCSA 2007
Country/TerritoryMalaysia
CityKuala Lumpur
Period26/08/0729/08/07
Internet address

Keywords

  • Authentication in UMS
  • Content protection and DRM
  • Digital watermarking and fingerprinting
  • Protocol
  • Security issues in UMS

Cite this