To ensure security of e-commerce, we propose a tripartite trade system based on secure watermarking. We add a third party (server) in the buyer-seller watermarking protocol. The seller sends his/her own image to the server, and let the server trade with the buyer. The seller first uses homomorphic encryption and spreading to embed the server's watermark in the original image and send the marked image to the server. Having received the marked image, the server uses spread-spectrum dither modulation to embed another watermark to be used for locating suspicious buyers who illegally distribute the image. The server then executes the buyer-seller watermarking protocol based on homomorphic encryption. In the tripartite trade of the e-commerce platform, the proposed system not only prevents both the server and buyer from being framed, but also can trace illegal distribution of any buyer or the server. The system also provides a solution to the secure online transactions for a large number of users.
XIN Xin, QIAN Zhen-xing, ZHANG Xin-peng, DAI Shu
. Tripartite Trade System Based on Secure Watermarking[J]. Journal of Applied Sciences, 2015
, 33(6)
: 575
-584
.
DOI: 10.3969/j.issn.0255-8297.2015.06.001
[1] Mohaghegh H, Karimin, Samavi H. Framework for watermark robustness adjustment using image depth map[C]//Iranian Conference on Electrical Engineering (ICEE), 2015:555-560.
[2] Lin W, Zhao H, Liu K. Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks[J]. IEEE Transaction on Multimedia, 2011, 2(13):191-205.
[3] Bianchi T, Piva A. TTP-free asymmetric fingerprinting protocol based on client side embedding[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10):1577-1568.
[4] Bianchi T, Piva A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2):87-96.
[5] Pfitzmann B, Schunter M. Asymmetric fingerprinting[J]. Advances in Cryptology-Eurocrypt, 1996, 5(12):84-95.
[6] Terelius B. Towards transferable watermarks in buyer-seller watermarking protocols[C]//IEEE International Workshop on Information Forensics and Security (WIFS), 2013:197- 202.
[7] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4):643-649.
[8] Zhang X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[9] Ibrahim I M, El-Din S H N, Hegazy A F A. An effective and secure buyer-seller water-marking protocol[C]//Third Intemational Symposium of Information Assurance and Seaunity, 2007:21- 28.
[10] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt 1999. New York:Springer, 1999, 1592:223-238.
[11] Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 12(14):2129-2139.
[12] Bianchi T, Piva A. Secure watermarking for multimedia content protection:a review of its benefits and open issues[J]. IEEE Signal Processing Magazine, 2013, 30:87-96.
[13] Prins J P, Erkin Z, Lagend R L. Anonymous fingerprinting with robust QIM watermarking techniques[J]. EURASIP Journal on Information Security, 2007, 8:1-13.
[14] Cox I J, Kilian J, Shamoon T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 12(6):1673-1687.
[15] Perez-Freire L, Comesana-Alfaro P, Perez-Gonzalez F. Detection in quantization-based watermarking:performance and security issues[J]. Security, Steganography, and Watermarking of Multimedia ContentsVⅡ, Proc, 2005, 5681:721-733.
[16] Swaminathan A, He S, Wu M. Exploring QIM-based anti-collusion fingerprinting for multimedia[J]. Security, Steganography, and Watermarking of Multimedia Contents VⅢ, 2006, 6072:1-12.
[17] Piva A, Bianchi T, Rosa A D. Secure client-side ST-DM watermark embedding[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):13-26.
[18] Zolotavkin Y, Juhola M. Quantization based watermarking approach with gain attack recovery[C]//International Conference on Digital lmage Computing:Techniques and Applications (DlCTA), 2014:1-8.
[19] Praveen V, Vigneshvaran M, Jeba L. Client-side embedding with asymmetric fingerprinting foridentifying illegal distributor[J]. International Journal of Applied Engineering Research, 2015, 10(5):13651-13660.