Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism
Abstract
:1. Introduction
- The protocol is able to address the existing problems associated with the BSWP without making use of a third party; instead, the protocol uses cloud capabilities.
- The proposed protocol shifts all the watermarking process on to the cloud, eliminating the role of a TTP.
2. Reviewing the Conventional BSWP
2.1. Sub-Protocols of Conventional BSWP
2.2. Different Attacks on Security of Conventional BSWP
2.3. Significance and Motivation
2.4. Security and Usability
2.5. Motivation and Contribution
- (1)
- The cloud service provider eliminates the role of trusted certificate authority.
- (2)
- The scheme provides sheltered dealing of digital content over the cloud.
- (3)
- The scheme uses a fingerprinting-based watermarking method to ensure digital rights.
- (4)
- This is a new technique to address the security gaps in the existing watermarking system.
3. Requirements of Proposed Vbswp-CeaH in the Cloud Environment
Additive Homomorphism Encryption in the Cloud Environment
- Step (1) Select two global public elements and where is a prime and is a primitive root of .
- Step (2) Buyer key generation takes place as follows.
- Select a private key where .
- Calculate the public key such that mod
- Step (3) Content owner key generation takes place as follows.
- Select a private key where
- Calculate public key such that mod
- Step (4) Buyer calculates the secret key.
- mod
- Step (5) Content owner calculates the secret key.
- mod
- Step (6) Feed this secret key into the additive homomorphism encryption function.
4. Proposed Vbswp-CeaH for Copyright Protection
- Why is the Watermark Certificate Authority (WCA) always considered as the TTP?
- Is the protocol still vulnerable to any kind of attack?
- How does replacing the WCA with a content service provider (CSP) make the protocol fast and efficient?
4.1. Registration Process
4.2. Algorithm for Secure Watermark Embedding
Algorithm 1: Algorithm for Secure Watermark Embedding. |
Input: Cimage, Woriginal (cover image, watermark, t, X, DM) Output: C’image, Pubkey (watermarked image, PUkey) begin Cimage → (Woriginal, ∞, Sekey, Oimg) Cimage→(Pubkey, ∞) Ccloud_env → C’image, (Athkey)PUk if C’image, = Cimage + Woriginal × PUkey ∞→ Embding Bits + Woriginal →Diffn(C’image - Cimage) DS→ PUkey (DS)= C’image, Pubkey end If end |
4.3. Algorithm for Watermark Extraction and Authentication
Algorithm 2: Algorithm for Watermark Extraction and Authentication. |
Input: C’image, PRkey (watermarked image, private key) Output: Cimage, W’ (extracted watermark, cover image) begin if (W’recovered) == (Woriginal) ∞ → DS → C’image, Pubkey if |C’image − Cimage| <45 db Resulted watermarked image is considered if DS = Extracted DS W’original, ∞, Sekey, Oimg → Cimage C’image, (Athkey)PUk →Ccloud_env end if end if end if end |
5. Results and Discussion Section
5.1. Experimental Setup of Vbswp-CeaH in the Cloud Environment
5.2. Performance Analysis of Vbswp-CeaH in the Cloud Environment
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Vbswp-CeaH | Vigorous buyer-seller watermarking protocol without trusted certificate authority for copyright protection in cloud environment through additive homomorphism |
BSWP | Buyer-seller watermarking protocol |
PSNR | Peak signal-to-noise ratio |
NCC | Normalized cross-correlation |
CSP | Content service provider |
WCA | Watermark certificate authority |
DCT | Discrete cosine transform |
TTP | Trusted third party |
PCA | Principal component analysis |
DWT | Discrete wavelet transform |
SVD | Singular value decomposition |
dB | Decibels |
References
- Goi, B.-M.; Phan, R.C.-W.; Yang, Y.; Bao, F.; Deng, R.H.; Siddiqi, M. Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. In International Conference on Applied Cryptography and Network Security; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3089. [Google Scholar]
- Memon, N.; Ping Wah, W. A buyer-seller watermarking protocol. IEEE Trans. Image Process. 2001, 10, 643–649. [Google Scholar] [CrossRef] [PubMed]
- Chin-Laung, L.; Pei-Ling, Y.; Pan-Lung, T.; Ming-Hwa, C. An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 2004, 13, 1618–1626. [Google Scholar]
- Zhu, J. Cloud Computing Technologies and Applications. In Handbook of Cloud Computing; Furht, B., Escalante, A., Eds.; Springer: Boston, MA, USA, 2010; pp. 21–45. [Google Scholar]
- Mukwevho, M.A.; Celik, T. Toward a Smart Cloud: A Review of Fault-tolerance Methods in Cloud Systems. IEEE Trans. Serv. Comput. 2018, 14, 589–605. [Google Scholar] [CrossRef]
- Lv, Z.; Qiao, L.; Verma, S.; Kavita. AI-enabled IoT-Edge Data Analytics for Connected Living. ACM Trans. Internet Technol. 2021, 21, 1–20. [Google Scholar] [CrossRef]
- Kumar, M.; Raju, K.S.; Kumar, D.; Goyal, N.; Verma, S.; Singh, A. An efficient framework using visual recognition for IoT based smart city surveillance. Multimed. Tools Appl. 2021, 80, 31277–31295. [Google Scholar] [CrossRef] [PubMed]
- Kumar, S.; Shanker, R.; Verma, S. Context Aware Dynamic Permission Model: A Retrospect of Privacy and Security in Android System. In Proceedings of the 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, India, 19–20 April 2018; pp. 324–329. [Google Scholar] [CrossRef]
- Terelius, B. Towards transferable watermarks in buyer-seller watermarking protocols. In Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 18–21 November 2013. [Google Scholar]
- Peng, Y.; Hsieh, Y.; Hsueh, C.; Wu, J. Cloud-based buyer-seller watermarking protocols. In Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, San Francisco, CA, USA, 4–8 August 2017. [Google Scholar]
- Dash, S.; Verma, S.; Kavita; Bevinakoppa, S.; Wozniak, M.; Shafi, J.; Ijaz, M.F. Guidance Image-Based Enhanced Matched Filter with Modified Thresholding for Blood Vessel Extraction. Symmetry 2022, 14, 194. [Google Scholar] [CrossRef]
- Salim, M.Z.; Abboud, A.J.; Yildirim, R. A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery. Electronics 2022, 11, 136. [Google Scholar] [CrossRef]
- Pavlović, K.; Kovačević, S.; Djurović, I.; Wojciechowski, A. Robust Speech Watermarking by a Jointly Trained Embedder and Detector Using a DNN. Digit. Signal Process. 2022, 122, 103381. [Google Scholar] [CrossRef]
- Agarwal, N.; Singh, P.K. Discrete cosine transforms and genetic algorithm based watermarking method for robustness and imperceptibility of color images for intelligent multimedia applications. Multimed. Tools Appl. 2022, 81, 19751–19777. [Google Scholar] [CrossRef]
- Wang, F.H.; Pan, J.S.; Jain, L.C. Digital Watermarking Techniques. In Innovations in Digital Watermarking Techniques. Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2009; Volume 232. [Google Scholar] [CrossRef]
- Pan, J.-S.; Huang, H.-C.; Jain, L.C. Intelligent Watermarking Techniques; World Scientific Pub Co Inc.: River Edge, NJ, USA, 2004. [Google Scholar]
- Kumar, A. A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. Multimed. Tools Appl. 2022, 81, 21417–21448. [Google Scholar] [CrossRef]
- Zhang, C.; Karjauv, A.; Benz, P.; Kweon, I.S. Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking. In Proceedings of the 29th ACM International Conference on Multimedia Association for Computing Machinery, Virtual, China, 20–24 October 2021; pp. 5158–5166. [Google Scholar]
- Pan, Z.; Hu, L.; Tang, W.; Li, J.; He, Y.; Liu, Z. Privacy-Preserving Multi-Granular Federated Neural Architecture Search A General Framework. IEEE Trans. Knowl. Data Eng. 2021, 1. [Google Scholar] [CrossRef]
- Liu, G.; Li, W.; Fan, X.; Li, Z.; Wang, Y.; Ma, H. An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard. Entropy 2022, 24, 608. [Google Scholar] [CrossRef] [PubMed]
- Zhu, D.; Zheng, J.; Zhou, H.; Wu, J.; Li, N.; Song, L. A Hybrid Encryption Scheme for Quantum Secure Video Conferencing Combined with Blockchain. Mathematics 2022, 10, 3037. [Google Scholar] [CrossRef]
- Kumar, A. A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT Information and Communication Technology for Sustainable Development; Springer: Berlin/Heidelberg, Germany, 2020; pp. 595–602. [Google Scholar]
- Kumar, A. Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection. Int. J. Cloud Appl. Comput. 2019, 9, 22–36. [Google Scholar] [CrossRef] [Green Version]
- Kumar, A.; Srivastava, S. Object Detection System Based on Convolution Neural Networks Using Single Shot Multi-Box Detector. Procedia Comput. Sci. 2020, 171, 2610–2617. [Google Scholar] [CrossRef]
- Kumar, A.; Reddy, S.S.S.S.; Kulkarni, V. An Object Detection Technique For Blind People in Real-Time Using Deep Neural Network. In Proceedings of the 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, 15–17 November 2019; pp. 292–297. [Google Scholar] [CrossRef]
- Ghosh, G.; Sood, M.; Verma, S. Internet of things based video surveillance systems for security applications. J. Comput. Theor. Nanosci. 2020, 17, 2582–2588. [Google Scholar] [CrossRef]
- Tian, X.; Huang, Y.; Verma, S.; Jin, M.; Ghosh, U.; Rabie, K.M.; ThuanDo, D. Power allocation scheme for maximizing spectral efficiency and energy efficiency tradeoff for uplink NOMA systems in B5G/6G. Phys. Commun. 2020, 43, 101227. [Google Scholar] [CrossRef]
- Dash, S.; Verma, S.; Kavita; Khan, M.S.; Wozniak, M.; Shafi, J.; Ijaz, M.F. A Hybrid Method to Enhance Thick and Thin Vessels for Blood Vessel Segmentation. Diagnostics 2021, 11, 2017. [Google Scholar] [CrossRef]
- Hussain, A.; Nazir, S.; Khan, F.; Nkenyereye, L.; Ullah, A.; Khan, S.; Verma, S. A resource efficient hybrid proxy mobile IPv6 extension for next generation IoT networks. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
- Pass, R.; Shelat, A. Micropayments for Decentralized Currencies. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015. [Google Scholar] [CrossRef]
- Kumar, A.; Ghrera, S.P.; Tyagi, V. An ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection. Pertanika J. Sci. Technol. 2017, 25, 57–76. [Google Scholar]
- Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105. [Google Scholar] [CrossRef]
- Zhang, J.; Kou, W.; Fan, K. Secure buyer–seller watermarking protocol. IEEE Proc.-Inf. Secur. 2006, 153, 15–18. [Google Scholar] [CrossRef] [Green Version]
- Liu, K.; Zhang, W.; Dong, X. A Cloud-User Protocol Based on Ciphertext Watermarking Technology. Secur. Commun. Netw. 2017, 2017, 4376282. [Google Scholar] [CrossRef] [Green Version]
- Zhang, L.Y.; Zheng, Y.; Weng, J.; Wang, C.; Shan, Z.; Ren, K. You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 2018, 17, 1218–1231. [Google Scholar] [CrossRef]
- Wang, J.; Wan, W.B.; Li, X.X.; De Sun, J.; Zhang, H.X. Color image watermarking based on orientation diversity and color complexity. Expert Syst. Appl. 2020, 140, 112868. [Google Scholar] [CrossRef]
- Wang, S.-S.; Yan, K.-Q.; Wang, S.-C. Achieving efficient agreement within a dual-failure cloud-computing environment. Expert Syst. Appl. 2011, 38, 906–915. [Google Scholar] [CrossRef]
- Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef]
- Katzenbeisser, S.; Lemma, A.; Celik, M.U.; van der Veen, M.; Maas, M.A. Buyer–Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 2008, 3, 783–786. [Google Scholar] [CrossRef]
- Chang, C.-C.; Tsai, H.-C.; Hsieh, Y.-P. An efficient and fair buyer–seller fingerprinting scheme for large scale networks. Comput. Secur. 2010, 29, 269–277. [Google Scholar] [CrossRef]
- Domingo-Ferrer, J.; Megías, D. Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 2013, 36, 542–550. [Google Scholar] [CrossRef] [Green Version]
- Eslami, Z.; Kazemnasabhaji, M.; Mirehi, N. Proxy signatures and buyer–seller watermarking protocols for the protection of multimedia content. Multimed. Tools Appl. 2014, 72, 2723–2740. [Google Scholar] [CrossRef]
- Frattolillo, F. A Buyer-Friendly and Mediated Watermarking Protocol for Web Context. ACM Trans. Web 2016, 10, 1–28. [Google Scholar] [CrossRef]
- Shao, M.-H. A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. In International Conference on Trust, Privacy and Security in Digital Business; Springer: Berlin/Heidelberg, Germany, 2007; pp. 44–53. [Google Scholar]
- Xie, J.Q.; Xie, Q.; Tian, L.J. A Buyer-Seller Digital Watermarking Protocol without Third Party Authorization. Adv. Eng. Forum 2012, 6–7, 452–458. [Google Scholar] [CrossRef]
- Yu, Z.; Thomborson, C.; Wang, C.; Wang, J.; Li, R. A cloud-based watermarking method for health data security. In Proceedings of the 2012 International Conference on High Performance Computing & Simulation (HPCS), Madrid, Spain, 2–6 July 2012. [Google Scholar]
Buyer B | Certificate Authority CA |
---|---|
B → | : Buyer wants to purchase a digital media. |
B→ CA | : M1 = { Request|| IDCO || CertB} |
CA→ B | : |
B→ CO | : M2 = { || IDCO || CertB} |
CO→ B | |
B→ CO | : M3 = { Request for Digital Media DM} |
CA→ | : KeyDH-SHA512(SkCA), ( |
CA→ B | : M4 = {} |
CA→ CO | : M5 = { ,,,} |
CA→ B |
Speckle Attack | Salt and Pepper Attack | ||||||
---|---|---|---|---|---|---|---|
Watermarked Images | Original PSNR | 0.04 | 0.06 | 0.08 | 0.04 | 0.06 | 0.08 |
“Peppers” | 48.06 | 47.73 | 46.42 | 45.23 | 46.93 | 44.35 | 42.66 |
“House” | 47.57 | 46.67 | 45.09 | 44.35 | 45.81 | 44.01 | 43.63 |
“Boat” | 46.65 | 44.12 | 43.43 | 41.87 | 45.04 | 44.86 | 43.89 |
“Fishing Boat” | 49.97 | 48.96 | 47.91 | 46.23 | 49.23 | 48.46 | 47.23 |
S.N. | Conventional BSWP | Security Problems Solved by Vbswp-CeaH in Cloud Environment | |||||
---|---|---|---|---|---|---|---|
AP | NFP | NRP | CRP | TP | UP | ||
1 | Yu et al. (2012) | ⨯ | ✔ | ✔ | ✔ | ✔ | ⨯ |
2 | Shao (2007) | ✔ | ✔ | ✔ | ⨯ | ⨯ | Not Reported |
3 | Xie et al. (2012) | ⨯ | ✔ | ✔ | ✔ | ✔ | ⨯ |
4 | Kumar et al. (2017) | ⨯ | Not Reported | ✔ | ⨯ | ✔ | ✔ |
5 | Chang et al. (2010) | ✔ | ✔ | Not Reported | ✔ | ✔ | ⨯ |
6 | Kumar (2019) | ⨯ | ✔ | ✔ | ⨯ | Not Reported | Not Reported |
7 | Domingo-Ferrer and Megías (2013) | ✔ | ✔ | ✔ | Not Reported | ⨯ | Not Reported |
8 | Zhang et al. (2006) | Not Reported | ✔ | ✔ | ⨯ | ✔ | Not Reported |
9 | Frattolillo et al. (2016) | ✔ | ✔ | ✔ | ⨯ | ✔ | ✔ |
10 | Eslami et al. (2014) | ✔ | Not Reported | ✔ | ⨯ | ✔ | ✔ |
11 | Proposed Vbswp-CeaH in Cloud Environment | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kumar, A.; Kumar, M.; Verma, S.; Kavita; Jhanjhi, N.Z.; Ghoniem, R.M. Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism. Symmetry 2022, 14, 2441. https://doi.org/10.3390/sym14112441
Kumar A, Kumar M, Verma S, Kavita, Jhanjhi NZ, Ghoniem RM. Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism. Symmetry. 2022; 14(11):2441. https://doi.org/10.3390/sym14112441
Chicago/Turabian StyleKumar, Ashwani, Mohit Kumar, Sahil Verma, Kavita, N. Z. Jhanjhi, and Rania M. Ghoniem. 2022. "Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism" Symmetry 14, no. 11: 2441. https://doi.org/10.3390/sym14112441
APA StyleKumar, A., Kumar, M., Verma, S., Kavita, Jhanjhi, N. Z., & Ghoniem, R. M. (2022). Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism. Symmetry, 14(11), 2441. https://doi.org/10.3390/sym14112441