Research Article
An Effective and Secure Buyer-Seller Watermarking Protocol
@INPROCEEDINGS{10.1109/IAS.2007.39, author={Ibrahim M. Ibrahim and Sherif Hazem Nour El-Din and Abdel Fatah A. Hegazy}, title={An Effective and Secure Buyer-Seller Watermarking Protocol}, proceedings={3rd International ICST Symposium on Information Assurance and Security}, publisher={IEEE}, proceedings_a={IAS}, year={2007}, month={9}, keywords={Certification Cryptography Data mining IP networks Information security Information technology Public key Transport protocols Transportation Watermarking}, doi={10.1109/IAS.2007.39} }
- Ibrahim M. Ibrahim
Sherif Hazem Nour El-Din
Abdel Fatah A. Hegazy
Year: 2007
An Effective and Secure Buyer-Seller Watermarking Protocol
IAS
IEEE
DOI: 10.1109/IAS.2007.39
Abstract
Different buyer-seller watermarking protocols have been proposed to address preserving the digital rights of both the buyer and the seller. The previously published protocols have faced one or more of the following major common problems which are customer's rights, copy deterrence, unbinding, conspiracy, buyer's participation in the dispute resolution, protocol's practice applicability and man in the middle attack problems. In this paper an effective and secure buyer-seller watermarking protocol is proposed that encapsulates flexible and yet convenient solution to all of the previously mentioned problems. The security of the proposed protocol is based on the security of the public key infrastructure (PKI). The proposed protocol exploits the existence of the trusted certification authority (CA) to solve the conspiracy problem. Furthermore, the proposed protocol solves the unbinding problem based on a novel idea of generating buyer's dual signature of both the purchase order and the buyer's associated unique watermark.