We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform

by Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 8
Year of Publication: 2011
Authors: Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar
10.5120/2528-3441

Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar . A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform. International Journal of Computer Applications. 21, 8 ( May 2011), 46-51. DOI=10.5120/2528-3441

@article{ 10.5120/2528-3441,
author = { Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar },
title = { A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 8 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number8/2528-3441/ },
doi = { 10.5120/2528-3441 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:59.839897+05:30
%A Ashwani Kumar
%A Vipin Tyagi
%A Mohd Dilshad
%A Kapil Kumar
%T A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 8
%P 46-51
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital contents. It plays a very important role in E-commerce. Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. It uses the public key encryption schemes. In this paper we propose a Practical Buyer Seller watermarking protocol based on Discrete Wavelet Transform (DWT) which is secure and flexible and gives more security from previous watermarking protocols to both buyer and seller. In this we use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. The protocol has better security property and higher efficiency.

References
  1. I Hartung F, Kuter M. Multimedia Watermarking Techniques, Proceeding of the IEEE, 1999,87(7):1079-1107.
  2. M. Kutter, S. K. Bhattacharjee, T. Ebrahimi. Towards Second Generation Watermarking Scheme. Image Processing, 1999. ICIP 99. Proceedings. vol.1: 320 – 323.
  3. F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’99), vol. 4, pp. 2067–2069, Phoenix, Ariz, USA, March 1999.
  4. I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673–1687, 1997.
  5. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.
  6. N. D. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 10(4):643–649, 2001.
  7. H.-S. Ju, H.-J. Kim, D.-H. Lee, and J.-I. Lim. An anonymous buyer-seller watermarking protocol with anonymity control. Information Security and Cryptology - ICISC, pages 421–432, November 2002.
  8. J.-H. P. Jae-Gwi Choi, Kouichi Sakurai. Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. In Applied Cryptography and Network Security, LNCS 2846, pages 265–279, 2003.
  9. X. G. Xia, C. G. Boncelet, G. R. Arce, A Multiresolution Watermark for Digital Images. Image Processing 1997 Proceedings. International Conference. vol.1 :548 – 551.
  10. C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 13(12):1618–1626, 2004.
  11. J. Zhang, W. Kou, and K. Fan. Secure buyer-seller watermarking protocol. In IEE Proceedings Information Security, volume 153, pages 15–18, March 2006.
  12. Mina Deng, Bart Preneel, "On Secure and Anonymous Buyer-Seller Watermarking Protocol" ,Third International Conference on Internet and Web Applications and Services ,pp. 524-529, June 2008.
  13. Vinu V Das and Nessy Thankachan, "A Buyer-Seller Watermarking Protocol for an Efficient and Secure Digital Transaction," in Proc. jSt Int. Conf. on Information System and Technology, India, 2007, pp. 127-132.
  14. G Voyatzis, N Nikolaidis, and I. Pitas, “Digital Watermarking: An Overview,” in Proc. 9th European Signal Processing Conf., Sept. 1998, pp. 9-12
  15. L Qiao and K Nahrstedlt, “Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Right,” Journal of Visual Communication and Image Representation, Vol. 9, pp. 194-210, Sept. 1998.
  16. R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of ACM, vol. 21, pp.120-126, 1978.
Index Terms

Computer Science
Information Sciences

Keywords

public key infrastructure copyright protection Digital watermarking