针对电子商务中三方交易存在的问题,提出基于安全水印的三方交易系统.在买卖方水印协议中加入第3方,卖方将所拥有的图像委托给服务器,让服务器与买方进行交易.首先依靠同态加密和扩频,在卖方的原始图像中嵌入服务器的水印,并将含水印的图像发送给服务器.服务器接收到图像后,先通过扩频抖动调制嵌入用于追踪非法传播时锁定可疑买方的定位水印,然后与买方执行基于同态加密的买卖方水印协议.在电子商务平台三方交易中,基于安全水印的三方交易系统不仅可保证服务器和买方不被陷害,而且可追踪非法传播的买方或服务器,为大用户群提供安全交易方案.
To ensure security of e-commerce, we propose a tripartite trade system based on secure watermarking. We add a third party (server) in the buyer-seller watermarking protocol. The seller sends his/her own image to the server, and let the server trade with the buyer. The seller first uses homomorphic encryption and spreading to embed the server's watermark in the original image and send the marked image to the server. Having received the marked image, the server uses spread-spectrum dither modulation to embed another watermark to be used for locating suspicious buyers who illegally distribute the image. The server then executes the buyer-seller watermarking protocol based on homomorphic encryption. In the tripartite trade of the e-commerce platform, the proposed system not only prevents both the server and buyer from being framed, but also can trace illegal distribution of any buyer or the server. The system also provides a solution to the secure online transactions for a large number of users.
[1] Mohaghegh H, Karimin, Samavi H. Framework for watermark robustness adjustment using image depth map[C]//Iranian Conference on Electrical Engineering (ICEE), 2015:555-560.
[2] Lin W, Zhao H, Liu K. Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks[J]. IEEE Transaction on Multimedia, 2011, 2(13):191-205.
[3] Bianchi T, Piva A. TTP-free asymmetric fingerprinting protocol based on client side embedding[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10):1577-1568.
[4] Bianchi T, Piva A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2):87-96.
[5] Pfitzmann B, Schunter M. Asymmetric fingerprinting[J]. Advances in Cryptology-Eurocrypt, 1996, 5(12):84-95.
[6] Terelius B. Towards transferable watermarks in buyer-seller watermarking protocols[C]//IEEE International Workshop on Information Forensics and Security (WIFS), 2013:197- 202.
[7] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4):643-649.
[8] Zhang X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[9] Ibrahim I M, El-Din S H N, Hegazy A F A. An effective and secure buyer-seller water-marking protocol[C]//Third Intemational Symposium of Information Assurance and Seaunity, 2007:21- 28.
[10] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt 1999. New York:Springer, 1999, 1592:223-238.
[11] Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 12(14):2129-2139.
[12] Bianchi T, Piva A. Secure watermarking for multimedia content protection:a review of its benefits and open issues[J]. IEEE Signal Processing Magazine, 2013, 30:87-96.
[13] Prins J P, Erkin Z, Lagend R L. Anonymous fingerprinting with robust QIM watermarking techniques[J]. EURASIP Journal on Information Security, 2007, 8:1-13.
[14] Cox I J, Kilian J, Shamoon T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 12(6):1673-1687.
[15] Perez-Freire L, Comesana-Alfaro P, Perez-Gonzalez F. Detection in quantization-based watermarking:performance and security issues[J]. Security, Steganography, and Watermarking of Multimedia ContentsVⅡ, Proc, 2005, 5681:721-733.
[16] Swaminathan A, He S, Wu M. Exploring QIM-based anti-collusion fingerprinting for multimedia[J]. Security, Steganography, and Watermarking of Multimedia Contents VⅢ, 2006, 6072:1-12.
[17] Piva A, Bianchi T, Rosa A D. Secure client-side ST-DM watermark embedding[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):13-26.
[18] Zolotavkin Y, Juhola M. Quantization based watermarking approach with gain attack recovery[C]//International Conference on Digital lmage Computing:Techniques and Applications (DlCTA), 2014:1-8.
[19] Praveen V, Vigneshvaran M, Jeba L. Client-side embedding with asymmetric fingerprinting foridentifying illegal distributor[J]. International Journal of Applied Engineering Research, 2015, 10(5):13651-13660.