Security

Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks

Download Now Free registration required

Executive Summary

Buyer-seller watermarking are protocols guaranteeing the buyer prevents false infringement accusations and the seller protects the watermark secrets from the buyer. Most recently, Chang et al. proposed an efficient and fair buyer-seller watermarking scheme for large scale networks quite recently. In this correspondence, the authors first shows its three weaknesses: the buyer can easily remove the watermark, the buyer can easily destroy the forensic information and the adversary can possibly learn about personal privacy of some honest customers. Thereafter, they suggest some countermeasures to defeat their described at-tacks while its merits are left unchanged.

  • Format: PDF
  • Size: 278.54 KB