首页> 外文期刊>Wireless personal communications: An Internaional Journal >Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
【24h】

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents

机译:可信赖的数字内容购买买卖双方水印协议分析

获取原文
获取原文并翻译 | 示例
           

摘要

In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of security is a major concern. Security in this setting encompasses both in the interest of the human users as well as their information and objects that they own. A typical kind of transaction interaction among users and/or machines in these environments is that of exchanging digital objects via purchases and/or ownership transfers, e.g. someone buying a song from iTunes via his iPhone, or downloading either bought or rented movies onto a portable DVD player. Here, there is a need to provide trustworthy protection of the rights of both parties; i.e. the seller's copyright needs to be protected against piracy, while on the other hand it has been highlighted in literature the need to protect innocent buyers from being framed. Indeed, if either party cannot be assured that his rights are protected when he is involved in transactions within such environments, he would shy away and instead prefer for instance the more conventional non-digital means of buying and selling. And therefore without active participation from human users and object owners it is difficult to fully kick off the actual realization of intelligent environments. Zhang et al. recently proposed a buyer-seller watermarking protocol without a trusted third party based on secret sharing. While it is a nice idea to eliminate the need of a trusted third party by distributing secret shares between the buyer and the seller such that neither party has knowledge of the fingerprint embedded in a content, we show that it is possible for a buyer to remove his part of the fingerprint from the content he bought. This directly disproves the piracy tracing property claimed by the protocol. In fact, since piracy tracing is one of the earliest security applications of watermarking schemes, it raises doubts as to the soundness of the design of this protocol.
机译:在无处不在的环境中,无论用户身在何处,人类用户都可以访问各种类型的(通常具有多媒体功能的)服务,安全问题是一个主要问题。在这种情况下,安全性既包括人类用户的利益,也包括他们所拥有的信息和对象。在这些环境中,用户和/或机器之间的交易交互的典型类型是通过购买和/或所有权转让来交换数字对象。有人通过iPhone从iTunes购买歌曲,或将购买或租借的电影下载到便携式DVD播放器上。在这里,有必要对双方的权利提供值得信赖的保护;也就是说,需要保护卖方的版权不受盗版的侵害,而另一方面,在文献中已经强调了保护无辜的买方免遭陷害的必要。的确,如果在这样的环境中参与交易时,如果不能保证任何一方能够保护自己的权利,他就会回避,而宁愿选择例如更为传统的非数字化买卖手段。因此,如果没有人类用户和对象所有者的积极参与,很难完全启动智能环境的实际实现。张等。最近,基于秘密共享,提出了一种不具有可信第三方的买卖双方水印协议。尽管通过在买卖双方之间分配秘密份额来消除信任的第三方的需求是一个不错的主意,这样任何一方都不会知道内容中嵌入的指纹,但我们表明,买方有可能删除他从购买的内容中提取的指纹部分。这直接证明了该协议要求的盗版追踪特性。实际上,由于盗版追踪是水印方案最早的安全应用之一,因此人们对该协议设计的合理性提出了疑问。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号