Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection

The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including...

Full description

Bibliographic Details
Main Authors: Goi, Bok Min, Phan, Raphael Chung Wei, Chuah, Hean Teik
Format: Book Section
Published: Springer 2007
Subjects:
Online Access:http://shdl.mmu.edu.my/3196/
_version_ 1848790260659519488
author Goi, Bok Min
Phan, Raphael Chung Wei
Chuah, Hean Teik
author_facet Goi, Bok Min
Phan, Raphael Chung Wei
Chuah, Hean Teik
author_sort Goi, Bok Min
building MMU Institutional Repository
collection Online Access
description The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including multimedia services in real time from the comfort of their homes e.g. payTV and interactive TV, streaming audiovisuals, video conferencing and video phones, interactive gaming and online merchandising. With this vast amount of multimedia content being distributed in the environment, there is a need to provide protection for the content from piracy and illegal duplication, which is an important security issue if the UE is to gain popularity and widespread usage. One method to provide content protection and tracing of illegal duplications is using buyer-seller watermarking protocols. In particular, owner-specific marks are embedded into the content to allow content protection and buyer-specific marks are embedded to trace illegal duplications. Two such protocols were independently proposed by Chang and Chung, and Cheung et al., at ICCT 2003 and HICSS 2004, respectively. We show that both the seller's and buyer's rights are not protected in both protocols and therefore the protocols fail to provide even the most basic security requirement of buyer-seller protocols. It is important that these protocols not be deployed for securing UE, but to undergo redesign and thorough security analysis before being reconsidered.
first_indexed 2025-11-14T18:09:47Z
format Book Section
id mmu-3196
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:09:47Z
publishDate 2007
publisher Springer
recordtype eprints
repository_type Digital Repository
spelling mmu-31962020-12-29T17:28:50Z http://shdl.mmu.edu.my/3196/ Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection Goi, Bok Min Phan, Raphael Chung Wei Chuah, Hean Teik T Technology (General) QA75.5-76.95 Electronic computers. Computer science The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including multimedia services in real time from the comfort of their homes e.g. payTV and interactive TV, streaming audiovisuals, video conferencing and video phones, interactive gaming and online merchandising. With this vast amount of multimedia content being distributed in the environment, there is a need to provide protection for the content from piracy and illegal duplication, which is an important security issue if the UE is to gain popularity and widespread usage. One method to provide content protection and tracing of illegal duplications is using buyer-seller watermarking protocols. In particular, owner-specific marks are embedded into the content to allow content protection and buyer-specific marks are embedded to trace illegal duplications. Two such protocols were independently proposed by Chang and Chung, and Cheung et al., at ICCT 2003 and HICSS 2004, respectively. We show that both the seller's and buyer's rights are not protected in both protocols and therefore the protocols fail to provide even the most basic security requirement of buyer-seller protocols. It is important that these protocols not be deployed for securing UE, but to undergo redesign and thorough security analysis before being reconsidered. Springer 2007-08 Book Section NonPeerReviewed Goi, Bok Min and Phan, Raphael Chung Wei and Chuah, Hean Teik (2007) Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection. In: Computational Science and Its Applications – ICCSA 2007. Lecture Notes in Computer Science, 4705 . Springer, pp. 951-960. ISBN 978-3-540-74472-6 https://link.springer.com/chapter/10.1007/978-3-540-74472-6_77 https://doi.org/10.1007/978-3-540-74472-6_77 https://doi.org/10.1007/978-3-540-74472-6_77
spellingShingle T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
Goi, Bok Min
Phan, Raphael Chung Wei
Chuah, Hean Teik
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title_full Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title_fullStr Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title_full_unstemmed Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title_short Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
title_sort cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
topic T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/3196/
http://shdl.mmu.edu.my/3196/
http://shdl.mmu.edu.my/3196/