DocumentCode :
2760436
Title :
Analysis of Two Watermarking Protocols Based on Commutative Encryption
Author :
Mohamad, Moesfa S. ; Poh, Geong Sen
Author_Institution :
Inf. Security Cluster, MIMOS Berhad, Kuala Lumpur, Malaysia
fYear :
2010
fDate :
19-23 July 2010
Firstpage :
115
Lastpage :
120
Abstract :
We analyse two watermarking protocols proposed by Wang, Leung, Cheung and Wang, and by Cheung, Leung and Wang. These protocols claimed to provide fair content tracing using watermarking schemes and commutative encryption, whereby a content provider can trace an illegal copy to a customer that distributed this copy. Simultaneously, an honest customer is assured that he or she will not be falsely accused of illegal content distribution. We show that the two protocols contain flaws by examining how a dishonest content provider can frame an honest customer by falsely accusing the customer of illegally distributing content. Similarly, we show how a dishonest customer may possibly redistribute the digital content without being traced by the content provider. Therefore, the protocol does not fulfill the aims as claimed. We further put forward our thoughts on how best to avoid these security weaknesses.
Keywords :
cryptographic protocols; watermarking; commutative encryption; content tracing; illegal content distribution; watermarking protocol; Buyer-seller watermarking protocol; commutative dncryption; digital watermarking; fair content tracing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-8089-0
Electronic_ISBN :
978-0-7695-4105-1
Type :
conf
DOI :
10.1109/COMPSACW.2010.30
Filename :
5615766
Link To Document :
بازگشت