DocumentCode
2760436
Title
Analysis of Two Watermarking Protocols Based on Commutative Encryption
Author
Mohamad, Moesfa S. ; Poh, Geong Sen
Author_Institution
Inf. Security Cluster, MIMOS Berhad, Kuala Lumpur, Malaysia
fYear
2010
fDate
19-23 July 2010
Firstpage
115
Lastpage
120
Abstract
We analyse two watermarking protocols proposed by Wang, Leung, Cheung and Wang, and by Cheung, Leung and Wang. These protocols claimed to provide fair content tracing using watermarking schemes and commutative encryption, whereby a content provider can trace an illegal copy to a customer that distributed this copy. Simultaneously, an honest customer is assured that he or she will not be falsely accused of illegal content distribution. We show that the two protocols contain flaws by examining how a dishonest content provider can frame an honest customer by falsely accusing the customer of illegally distributing content. Similarly, we show how a dishonest customer may possibly redistribute the digital content without being traced by the content provider. Therefore, the protocol does not fulfill the aims as claimed. We further put forward our thoughts on how best to avoid these security weaknesses.
Keywords
cryptographic protocols; watermarking; commutative encryption; content tracing; illegal content distribution; watermarking protocol; Buyer-seller watermarking protocol; commutative dncryption; digital watermarking; fair content tracing;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual
Conference_Location
Seoul
Print_ISBN
978-1-4244-8089-0
Electronic_ISBN
978-0-7695-4105-1
Type
conf
DOI
10.1109/COMPSACW.2010.30
Filename
5615766
Link To Document