3rd International ICST Symposium on Information Assurance and Security

Research Article

An Effective and Secure Buyer-Seller Watermarking Protocol

  • @INPROCEEDINGS{10.1109/IAS.2007.39,
        author={Ibrahim M. Ibrahim and Sherif  Hazem Nour El-Din and Abdel Fatah A. Hegazy},
        title={An Effective and Secure Buyer-Seller Watermarking Protocol},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={Certification  Cryptography  Data mining  IP networks  Information security  Information technology  Public key  Transport protocols  Transportation  Watermarking},
        doi={10.1109/IAS.2007.39}
    }
    
  • Ibrahim M. Ibrahim
    Sherif Hazem Nour El-Din
    Abdel Fatah A. Hegazy
    Year: 2007
    An Effective and Secure Buyer-Seller Watermarking Protocol
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.39
Ibrahim M. Ibrahim1,*, Sherif Hazem Nour El-Din1,*, Abdel Fatah A. Hegazy2,*
  • 1: Information Technology Industry Development Agency (ITIDA) Egypt
  • 2: Arab Academy for Science and Technology and Maritime Transportation Cairo, Egypt
*Contact email: imostafa@mcit.gov.eg, snoureldin@mcit.gov.eg, hegazy@aast.edu

Abstract

Different buyer-seller watermarking protocols have been proposed to address preserving the digital rights of both the buyer and the seller. The previously published protocols have faced one or more of the following major common problems which are customer's rights, copy deterrence, unbinding, conspiracy, buyer's participation in the dispute resolution, protocol's practice applicability and man in the middle attack problems. In this paper an effective and secure buyer-seller watermarking protocol is proposed that encapsulates flexible and yet convenient solution to all of the previously mentioned problems. The security of the proposed protocol is based on the security of the public key infrastructure (PKI). The proposed protocol exploits the existence of the trusted certification authority (CA) to solve the conspiracy problem. Furthermore, the proposed protocol solves the unbinding problem based on a novel idea of generating buyer's dual signature of both the purchase order and the buyer's associated unique watermark.