<i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism
Cloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restri...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-11-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/14/11/2441 |
_version_ | 1797463921151442944 |
---|---|
author | Ashwani Kumar Mohit Kumar Sahil Verma Kavita N. Z. Jhanjhi Rania M. Ghoniem |
author_facet | Ashwani Kumar Mohit Kumar Sahil Verma Kavita N. Z. Jhanjhi Rania M. Ghoniem |
author_sort | Ashwani Kumar |
collection | DOAJ |
description | Cloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restrict the digital media which is illegally redistributed by the authorized users. However, the digital watermarking technique and encryption-based methods are also not sufficient enough to provide copyright protection. The watermarking protocol is used to provide intellectual property for the customer and the service provider. This research paper provides a vigorous buyer-seller watermarking protocol without trusted certificate authority for copyright protection in the cloud environment. This research work uses the cloud environment which enables the cloud as a service infrastructural provider for storing credentials such as public and private secret keys and the digital certificates of interacting parties. The scheme uses additive homomorphism encryption with an effective key exchange algorithm for exchanging digital media. This proposed approach addresses the problems of anonymity and copy deterrence and protects the digital rights of the buyer and seller; these most up-to-date issues are related to information security. Furthermore, the experiment results conclude that the proposed protocol is flexible and secure even in a non-secure communication channel. We have used performance measures such as PSNR, NCC and cost in time methods for checking the integrity of the proposed protocol. The conducted experiments show a stronger robustness and high imperceptibility for the watermark and watermarked images. |
first_indexed | 2024-03-09T17:57:37Z |
format | Article |
id | doaj.art-df5b4094a4264c129b9fca23ddd8a22a |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-09T17:57:37Z |
publishDate | 2022-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-df5b4094a4264c129b9fca23ddd8a22a2023-11-24T10:14:05ZengMDPI AGSymmetry2073-89942022-11-011411244110.3390/sym14112441<i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive HomomorphismAshwani Kumar0Mohit Kumar1Sahil Verma2Kavita3N. Z. Jhanjhi4Rania M. Ghoniem5Department of Computer Science and Engineering, Faculty of Engineering and Technology, SRM Institute of Science and Technology, NCR Campus, Ghaziabad 201204, IndiaSchool of Engineering, MIT-ADT University, Pune 412201, IndiaFaculty of Computer Science and Engineering, SGT University, Gurugram 122505, IndiaFaculty of Computer Science and Engineering, SGT University, Gurugram 122505, IndiaSchool of Computer Science, SCS, Taylors University, Subang Jaya 47500, MalaysiaDepartment of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi ArabiaCloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restrict the digital media which is illegally redistributed by the authorized users. However, the digital watermarking technique and encryption-based methods are also not sufficient enough to provide copyright protection. The watermarking protocol is used to provide intellectual property for the customer and the service provider. This research paper provides a vigorous buyer-seller watermarking protocol without trusted certificate authority for copyright protection in the cloud environment. This research work uses the cloud environment which enables the cloud as a service infrastructural provider for storing credentials such as public and private secret keys and the digital certificates of interacting parties. The scheme uses additive homomorphism encryption with an effective key exchange algorithm for exchanging digital media. This proposed approach addresses the problems of anonymity and copy deterrence and protects the digital rights of the buyer and seller; these most up-to-date issues are related to information security. Furthermore, the experiment results conclude that the proposed protocol is flexible and secure even in a non-secure communication channel. We have used performance measures such as PSNR, NCC and cost in time methods for checking the integrity of the proposed protocol. The conducted experiments show a stronger robustness and high imperceptibility for the watermark and watermarked images.https://www.mdpi.com/2073-8994/14/11/2441cloud environmentprivacy-preservingidentity as a serviceinfrastructure provider |
spellingShingle | Ashwani Kumar Mohit Kumar Sahil Verma Kavita N. Z. Jhanjhi Rania M. Ghoniem <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism Symmetry cloud environment privacy-preserving identity as a service infrastructure provider |
title | <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism |
title_full | <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism |
title_fullStr | <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism |
title_full_unstemmed | <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism |
title_short | <i>Vbswp-CeaH</i>: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism |
title_sort | i vbswp ceah i vigorous buyer seller watermarking protocol without trusted certificate authority for copyright protection in cloud environment through additive homomorphism |
topic | cloud environment privacy-preserving identity as a service infrastructure provider |
url | https://www.mdpi.com/2073-8994/14/11/2441 |
work_keys_str_mv | AT ashwanikumar ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism AT mohitkumar ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism AT sahilverma ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism AT kavita ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism AT nzjhanjhi ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism AT raniamghoniem ivbswpceahivigorousbuyersellerwatermarkingprotocolwithouttrustedcertificateauthorityforcopyrightprotectionincloudenvironmentthroughadditivehomomorphism |