• DocumentCode
    2760436
  • Title

    Analysis of Two Watermarking Protocols Based on Commutative Encryption

  • Author

    Mohamad, Moesfa S. ; Poh, Geong Sen

  • Author_Institution
    Inf. Security Cluster, MIMOS Berhad, Kuala Lumpur, Malaysia
  • fYear
    2010
  • fDate
    19-23 July 2010
  • Firstpage
    115
  • Lastpage
    120
  • Abstract
    We analyse two watermarking protocols proposed by Wang, Leung, Cheung and Wang, and by Cheung, Leung and Wang. These protocols claimed to provide fair content tracing using watermarking schemes and commutative encryption, whereby a content provider can trace an illegal copy to a customer that distributed this copy. Simultaneously, an honest customer is assured that he or she will not be falsely accused of illegal content distribution. We show that the two protocols contain flaws by examining how a dishonest content provider can frame an honest customer by falsely accusing the customer of illegally distributing content. Similarly, we show how a dishonest customer may possibly redistribute the digital content without being traced by the content provider. Therefore, the protocol does not fulfill the aims as claimed. We further put forward our thoughts on how best to avoid these security weaknesses.
  • Keywords
    cryptographic protocols; watermarking; commutative encryption; content tracing; illegal content distribution; watermarking protocol; Buyer-seller watermarking protocol; commutative dncryption; digital watermarking; fair content tracing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual
  • Conference_Location
    Seoul
  • Print_ISBN
    978-1-4244-8089-0
  • Electronic_ISBN
    978-0-7695-4105-1
  • Type

    conf

  • DOI
    10.1109/COMPSACW.2010.30
  • Filename
    5615766