SlideShare a Scribd company logo
1 of 4
Download to read offline
Full Paper
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011

An Efficient Buyer - Seller Protocol to Identify
the Perpetrator
1

Vinu V Das, 2J. FazlurRahman

1

2

Faculty of Computer Science & Engineering, Pacific University, Udaipur, India
Professor Emeritus & Head (R&D Centre), HKBK College of Engineering, Bangalore, India
Email: 1vinuvdas@gmail.com, 2jfazlu2003@yahoo.co.in

Abstract: Digital watermarks are used to prevent the possession
and transmission of copyright intellectual property over the
internet. Digital watermarking system is playing an
irrevocable role in privacy-preserving, buyer-seller
communication and e-commerce of digital content. In the past,
many buyer-seller protocols have been proposed to address
the copyright issues. M ost of these protocols are only
protecting digital copyright of the digital content. This paper
proposes a new efficient buyer seller watermarking protocol
for secure digital transaction and to identify the Perpetrator
who actually pirates the digital content. To implement this
system we use a multi layerTerminate and Stay Resident
(TSR) scripting programs before embedding the
watermarking.

I. INTRODUCTION
The major benefit of digital revolution is the ease of
communication and duplication of digital contents. Even
though such benefits often create limitation to the copyright
owners from having a financial gain from licensing such
contents, digital watermarking has been prepared as a suitable
deterrent to illegal copying and distribution.
A digital watermarking is an imperceptible information,
regarding the copyright owner, embedded to degrade linearly
with the degradation of the content itself. Embedding the
watermark information into the digital content will help to
identify the originality of the content as well as the copyright
owner and buyer/dealer. Having a digital watermarking buyerseller protocol for the privacy preservation and to trace piracy
to the original perpetrator is the need of the day. Moreover
the system may also provide a provision to buyers, sellers,
owners or dealers to check the originality of the system.
In the past, many buyer-seller protocols have been
proposed to address the copyright issues. Most of these
protocols [6-13] are not only protecting digital copyright by
embedding watermarking in digital content but also protecting
the digital content.
In Poh and Martin’s framework, the buyer generates the
watermark and the watermarking authority is used to verify
that the watermark is well formed such as [5] and [12]. My
previous work [7] and [10] are addressing the issues of
customer right’s and unbinding problem. It also solves buyer
verification and certification authority obligation problem.
William etl [14] introduced the concept of rigorous
analysis of buyer-seller watermarking protocols using a formal
analysis technique used to check communication protocols.
All these system have miserably failed to identify the culpit if
the embedded copyrighted watermarking content on the
© 2011 ACEEE
51
DOI: 01.IJNS.2.4.51

digital content is changed or hacked.
Even though many solutions are proposed for many
issues of privacy and buyer-seller with watermarking, no
effort has made to identify the perpetrator of the piracy. Buyerseller protocol in this paper is a novel method for protecting
the privacy and locate the original perpetrator who actually
pirated the digital content. The proposed system alerts the
copyright owner regarding the geographical and network
location of the perpetrator, as soon as privacy is encountered.
II. PROPOSED SYSTEM
The proposed protocol mainly address the issue to identify the perpetrator, as soon as privacy is encountered. The
proposed model based on any public key cryptosystem has
five different roles as follows.
1. O: The copyright owner of the licensed digital content,
who wants to sell the product through the seller or
dealer.
2. S: The seller or the sales point, from where the buyer
purchases the digital content. The seller may be the
original owner of the digital content, or an authorized
reselling agent or dealer.
3. B: The genuine buyer, who wants to purchase a digital
content from the seller S.
4. H: The present holder of the digital content who is
processing the pirated watermarked content.
5. CA: The Watermark Certification Authority is
responsible for issuing watermark based on
Transaction Identification number (TID), Holder’s
MAC, Holder ’sPublic key (Ps), and Product
Identification number (PID). The WCA also issues
the digital signature certificate based on private key
in such a way that anyone in the electronics commerce
transaction can check the authenticity to avoid any
future repudiation. They may appoint trusted Regional
Watermark Certification Authorities (RWCA) to share
and reduce its workload.
6. ARB: An arbiter, who adjudicates lawsuits against the
infringement of copyright and intellectual property.
This paper restricts itself to further discussion on security or implementation issues related to the public key
cryptosystem by assuming that a public key infrastructure
has been well deployed so that each party has its own public-private key pair as well as a digital signature certificate
issued by WCA. Before elaborating further on the proposed
protocol, the notations used in this model are defined below.
Full Paper
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011
X
W

Original copy of the digital content
Generated Watermark, which is to be
embedded into the digital content X
MAC
Media Access Control (MAC) address of the
networking device is used for generating the
watermarking. MAC is also used identify the
perpetrator.
PID
Unique number given by the CA to identify a
digital product, which will be published in
website for anyone who is likely to take part
in the transaction.
TID
The CA is responsible for issuing a unique
random number for every transaction, in order
to prevent the duplication when selling more
copies of a digital content to a specific B by
aSor O.
TSR
A kind of a Terminate and Stay Resident (TSR)
scripting program that can access MAC of
the system to compare the same in the
watermarked content. No access to memory
or processing or any other system unit. The
TSR will active till the digital content is
WID
Watermark Identification number is generated
by CA, which is only known to CA for
verifying the originality of the purchased
product. WID will be stored in a database
along with TID, PID, B, S details.

Watermark information binary insertion
operator, which inserts watermark into the
original copy of digital content.
X
Watermarked digital content, where the
watermark W is inserted into the digital
content X using a function , (XW).
(PS, SS)
A public-secret key pair, where PS is S’s public
key and SS is S’s secret key.
Public key encryption and decryption algorithms
EPb(M)
The message M is encrypted using B’s
public key
DSca(C)
The cipher text C is decrypted using CA’s
private key
By XW means, where W = (WSWB)
x1w1, x2w2 …….. xnwn, x n+1w n+1 …….. xmwm}
A privacy homomorphism with respect to the binary
operator  is applied to insert a watermark W to any original
copy of the digital content X. For every a and b in the message
block,  has the property that
EPK (a  b) = EPK (a)  EPK (b)
where PK is the public encryption key. The buyer-seller
protocol in this section, using watermark techniques for an
efficient and secure digital transaction, has five sub-protocols:
Registration and Buyer-Seller Protocol, TSR Watermarking,
Perpetrator Alert, Arbitration Protocol and Relocation
Request.

where the O registers a digital content, to be sold, with the
Certification Authority (CA) with the Product ID number, PID.
Once the O reaches to an agreement on the terms and
conditions regarding price and service with the seller or dealer
S, it will request the CAto issue the digital marked content to
S with their Media Access Control address, MACo, and public
key,Po for the a specific product transaction, TID.

Fig. 1 Registration and Buyer-Seller protocol

Figure 2 has the details of possible transactions in the
proposed registration and Buyer-Seller protocol, which is
explained below:
1. When O wants to sell a digital content over an internet,
first it has to register with CAwith the product
Identification number, PID, and the Public Key Po. O
initiates the registration transaction by sending an
encrypted PID and P o with CA’s publ ic key,
EPca(PID+PS).
2. CA generates the unique watermarking after collecting
the MACo, Poand Transaction identification number,
TID. The this watermark is combined with the TSR
scripting program
EPo[XTSRW(MACo, TID, Po)]
All these details are stored in the CA’s database, and it
is only known to CA and corresponding arbitrator ARB.
3. O will identify, negotiate, and finalize the terms and
conditions of the possible dealers, D or a Seller, S; to
possibly identify the genuine Buyers, B.
4. O will request CA to issue the watermarked content of
PIDto S.Epca(Ps, PID)
5. CAidentifies the MAC of S and issues the watermarked
content to S, for possible display and identification of
the genuine Buyers, B
EPs[X  TSR W(MACs, TID, Ps)]
6. CA sends the acknowledgement, EPo[ACK(Ps, PID)], to
O regarding the watermarked PID to S.
7. Osends the acknowledgement, EPs[ACK(Ps, PID)], to S
regarding the watermarked PID from CA.
8. S will identify, negotiate, and finalize the payments with
the genuine Buyers, B.
9. S will request CA to issue the watermarked content of
PIDto B.Epca(Pb, PID)
10. CA identifies the MAC of B and issues the watermarked
content to B.
EPb[X  TSR W(MACb, TID, Pb)]
11. CA sends the acknowledgement, EPs[ACK(Pb, PID)], to

A. Registrationand Buyer-Seller Protocol
Figure 1 shows the proposed registration protocol for
any buyer-seller networking transaction using watermarking,
© 2011 ACEEE
DOI: 01.IJNS.2.4.51

52
Full Paper
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011

Fig. 2 Transactions in the Registration and Buyer-Seller Protocol

S regarding the watermarked PID to B.
12. Ssends the acknowledgement, EPb[ACK(Pb, PID)], to B
regarding the watermarked PID from CA.
At the end of the registration and buyer-seller protocol,
S is authorized to sell the product PID, by O; and S identifies
the buyer B to sell the watermarked product through CA.

Third layer of the TSR watermarking is the actual
watermark information where PH,PID and other information
is embedded to solve numerous other issues resolved till
now.
C. Perpetrator Alert
The Figure 5 shows the Alert mechanism implanted in the
watermarked content with the help of TSR, when a piracy is
observed.

B. TSR Watermarking
Figure 3 shows the TSR watermarking in 3 layers. The
base layer is the actual digital content X to be sold. Layer 2 is
the flag checking TSR scripting program, generated by the
CA, which will contain encrypted static 10 flag counters (as
shown in the Figure 4) to store the required information to
check the piracy.The TSR(runs itself and checks in every
minute or hour or day as the security of the content demands)
will access the MAC of the existing place of digital content
and check the flag of the digital content with the help of KEY
and PH. If anyone tries to duplicate the content the CARRY
and KEY changes, and alert generates. If an unauthorized
person is holding the content without duplicating, then the
PH (when decrypting the SH) and MAC changes will be
noticed. The system implementers have every freedom to
design the Flag Counters to maximize the security.

Fig. 5 Perpetrator Alert

Piracy can be detected in three cases by the TSR by
looking at the flags, MAC and Watermarked contents. Case(1):
where the holder, H, of the digital content is carrying the
original digital content intended for another genuine buyer,
B. TSR will detect this by checking the MAC of the holder. In
this case H may not be able to use the digital content as H
will not be able to decrypt using the SH , and requires
SB.Case(2): where the holder, H, of the digital content is
carrying the duplicate digital content. The CARRY and KEY
flag might have changed when duplicating the content. Apart
from that MAC and PB will differ.Case(3): where the genuine
buyerB, of the digital content duplicated the original content.
TSR will identify and alertthe CARRY and KEY flag which is
changed when duplicating the content. The alert (IP and MAC
address of the H, PID, Po, PS, PH, TID) is often sent to the O of
the digital content and ARB.

Fig. 3 TSR watermarking in 3 Layer

D. Arbitration Protocol
The information related to the licensed owner, O, and
corresponding arbitrator, ARB, information is stored in the

Fig. 4 Static Flag Counters in the TSR Layer

© 2011 ACEEE
DOI: 01.IJNS.2.4.51

53
Full Paper
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011
watermark. Tampering this information will destroy (completely
or partially) the digital content. As soon as piracy is observed,
an alert is initiated to the O of the digital content and ARB.
The ARB further monitors and checks the IP & MAC address
using the existing network tracking system to trace down the
perpetrator.

REFERENCES
[1] Poh, G.S., Martin, K.M, “A framework for design and analysis
of asymmetric fingerprinting protocols”,Third International
Symposium on Information Assurance and Security, pp. 457–
461 (2007)
[2] N Memon and P W Wong, “Protecting Digital Media Contents,”
Commun. ACM, Vol 41, No. 7, July 1998, pp. 35-43.
[3] N Memon and P W Wong, “A Buyer-Seller Watermarking
Protocol,” IEEE Trans. on Image Processing, Vol. 10, Apr.
2001, pp. 643-649.
[4] L Qiao and K Nahrstedlt, “Watermarking Schemes and Protocols
for Protecting Rightful Ownership and Customer’s Right,” J.
of Visual Communication and Image Representation, Vol. 9,
Sept. 1998, pp. 194-210.
[5] Shao, M.H.: A privacy-preserving buyer-seller watermarking
protocol with semi trust third party”, Proceeding of
TrustBus’07, Volume 4657, Springer LNCS, page 44-53.,
(2007)
[6] Lei C-L, Yu P-L, Tsai P-L and Chan M-H, “An Efficient and
Anonymous Buyer-Seller Watermarking Protocol,” IEEE
Trans. on Image Processing, Vol. 13, No.12, 2004, pp. 16181626.
[7] Vinu V Das and NessyThankachan, “A Buyer-Seller
Watermarking Protocol for an Efficient and Secure Digital
Transaction,” in Proc. 1 st Int. Conf. on Information System
and Technology, India, 2007, pp. 127-132.
[8] K Gopalakrishnan, N Memon, and PL Vora, “Protocols for
Watermark Verification,” IEEE Multimedia, Vol. 8, Oct-Dec
2001, pp. 66-70.
[9] J Zhang, W Kou and K Fan, “Secure Buyer-Seller Watermarking
Protocol,” IEE Proc. Int. Conf. Security, Vol. 153, No. 1, March
2006.
[10] Vinu V Das, “A Tree Based Buyer-Seller Watermarking
Protocol,” in Proc. 3 rd Int. Joint Conf. on Computer,
Information, Systems Sciences, and Engineering, USA, 2007.
[11] Goi B-M, Phon R C-W, Yang Y, Bao F, Deng R H, and Siddiqi
M U, “Cryptanalysis of two Anonymous Buyer-Seller
Watermarking Protocols and an Improvement for true
Anonymity,” in Proc. Applied Cryptography and Network
Security, 2004, LNCS 3089, pp. 369-382.
[12] I M Ibrahim, SherifHazem N E-D, and Abdel Fatah A H, “ An
Effective and Secure Buyer-Seller Watermarking Protocol,”
IEEE Proc. 3rd Int. Symposium of Information Assurance and
Security, 2007, pp. 21-26.
[13] Chang C-C and Chung C-Y, “An Enhanced Buyer Seller
Watermarking Protocol,” in Proc. of ICCT 2003, IEEE CS
Press, 2003, pp. 1779-1783.
[14] Williams, DM,Treharne, H,Ho, ATSand Culnane, C, “Using a
Formal Analysis Technique to Identify an Unbinding Attack
on a Buyer-Seller Watermarking Protocol”,ACM Multimedia
and Security Workshop, 2008

E. Relocation Request
Figure 6 illustrates how to handle the relocation of the
digital content request. There is always a possibility that
genuine buyer may change the geographical location or the
computer or the working and storing device. In such cases
all the purchases will have to be surrendered to CA at
transaction (1) with the new MAC address, to relocate to
new device or location. Newly embedded digital content will
be send to B in the transaction (2); which will be later
forwarded to transaction (3).

Fig 6 Relocation Request

Since the O and ARB gets the alert as soon as piracy
observed, a proactive action and prevention against duplication, which will ultimately lead to copyright protection.
III. CONCLUSION
This paper proposed an efficient and secure buyer-seller
watermarking protocol to identify the Perpetrator who actually pirates the digital content. All the existing system can be
implemented in layer 3 of watermarking to solve the existing
many issues stated by other researched in this field.The system is designed for any public key crypto system to restrict
the unauthorized data drift.The security of this protocol lies
on the efficient algorithm of TSR scripting program and flag
counters. The security and robustness of the encryption standard and different homomorphism, permutation and combination functions used in this protocol also plays an important role, which can further be modified and developed to
improve the efficiency of the protocol.

© 2011 ACEEE
DOI: 01.IJNS.2.4.51

54

More Related Content

What's hot

Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for PropertiesBilcareltd
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"idsecconf
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...OKsystem
 
OVERVIEW OF SMART CONTRACT & ADOPTION
OVERVIEW OF SMART CONTRACT  &  ADOPTIONOVERVIEW OF SMART CONTRACT  &  ADOPTION
OVERVIEW OF SMART CONTRACT & ADOPTIONLokesh Gupta
 
TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMhackingtrialpay
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingIRJET Journal
 
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meBlockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meJuan Ignacio Pérez Sacristán
 
IPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsIPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsMudit Mittal
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
How Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of BusinessHow Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of Businessclark800
 
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánEvent Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánJuan Ignacio Pérez Sacristán
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information securityDATA SECURITY SOLUTIONS
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?MSA Technosoft
 

What's hot (19)

Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for Properties
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
 
OVERVIEW OF SMART CONTRACT & ADOPTION
OVERVIEW OF SMART CONTRACT  &  ADOPTIONOVERVIEW OF SMART CONTRACT  &  ADOPTION
OVERVIEW OF SMART CONTRACT & ADOPTION
 
TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACM
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.meBlockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
Blockchain analysis: 2016-11-23 MeetUp FinTech Marketpay.io - LemonPay.me
 
IPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsIPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological Aspects
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
Midata Thoughts No. 1
Midata Thoughts No. 1Midata Thoughts No. 1
Midata Thoughts No. 1
 
Smart contracts
Smart contractsSmart contracts
Smart contracts
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
How Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of BusinessHow Bitcoin 2.0 Will Shape the Future of Business
How Bitcoin 2.0 Will Shape the Future of Business
 
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez SacristánEvent Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
Event Itnig - Smart Contracts by MarketPay, Juan Ignacio Pérez Sacristán
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information security
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 

Similar to Efficient Buyer-Seller Protocol Identifies Perpetrator

06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Ahmed Omar
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4Capgemini
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCapgemini
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTURohit Verma
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Using Blockchain for Digital Identifiers. The case of LEI.
Using Blockchain for Digital Identifiers. The case of LEI.Using Blockchain for Digital Identifiers. The case of LEI.
Using Blockchain for Digital Identifiers. The case of LEI.sopekmir
 
Protocol Payment in M-commerce Transaction
Protocol Payment in M-commerce TransactionProtocol Payment in M-commerce Transaction
Protocol Payment in M-commerce Transactioniosrjce
 
Blockchain + IoT + AI Integration Insights from Patents
Blockchain + IoT + AI Integration Insights from PatentsBlockchain + IoT + AI Integration Insights from Patents
Blockchain + IoT + AI Integration Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 

Similar to Efficient Buyer-Seller Protocol Identifies Perpetrator (20)

06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Advance itt
Advance ittAdvance itt
Advance itt
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Using Blockchain for Digital Identifiers. The case of LEI.
Using Blockchain for Digital Identifiers. The case of LEI.Using Blockchain for Digital Identifiers. The case of LEI.
Using Blockchain for Digital Identifiers. The case of LEI.
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and CryptocurrenciesIntroduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
 
P0176598101
P0176598101P0176598101
P0176598101
 
Protocol Payment in M-commerce Transaction
Protocol Payment in M-commerce TransactionProtocol Payment in M-commerce Transaction
Protocol Payment in M-commerce Transaction
 
Blockchain + IoT + AI Integration Insights from Patents
Blockchain + IoT + AI Integration Insights from PatentsBlockchain + IoT + AI Integration Insights from Patents
Blockchain + IoT + AI Integration Insights from Patents
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Efficient Buyer-Seller Protocol Identifies Perpetrator

  • 1. Full Paper ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 An Efficient Buyer - Seller Protocol to Identify the Perpetrator 1 Vinu V Das, 2J. FazlurRahman 1 2 Faculty of Computer Science & Engineering, Pacific University, Udaipur, India Professor Emeritus & Head (R&D Centre), HKBK College of Engineering, Bangalore, India Email: 1vinuvdas@gmail.com, 2jfazlu2003@yahoo.co.in Abstract: Digital watermarks are used to prevent the possession and transmission of copyright intellectual property over the internet. Digital watermarking system is playing an irrevocable role in privacy-preserving, buyer-seller communication and e-commerce of digital content. In the past, many buyer-seller protocols have been proposed to address the copyright issues. M ost of these protocols are only protecting digital copyright of the digital content. This paper proposes a new efficient buyer seller watermarking protocol for secure digital transaction and to identify the Perpetrator who actually pirates the digital content. To implement this system we use a multi layerTerminate and Stay Resident (TSR) scripting programs before embedding the watermarking. I. INTRODUCTION The major benefit of digital revolution is the ease of communication and duplication of digital contents. Even though such benefits often create limitation to the copyright owners from having a financial gain from licensing such contents, digital watermarking has been prepared as a suitable deterrent to illegal copying and distribution. A digital watermarking is an imperceptible information, regarding the copyright owner, embedded to degrade linearly with the degradation of the content itself. Embedding the watermark information into the digital content will help to identify the originality of the content as well as the copyright owner and buyer/dealer. Having a digital watermarking buyerseller protocol for the privacy preservation and to trace piracy to the original perpetrator is the need of the day. Moreover the system may also provide a provision to buyers, sellers, owners or dealers to check the originality of the system. In the past, many buyer-seller protocols have been proposed to address the copyright issues. Most of these protocols [6-13] are not only protecting digital copyright by embedding watermarking in digital content but also protecting the digital content. In Poh and Martin’s framework, the buyer generates the watermark and the watermarking authority is used to verify that the watermark is well formed such as [5] and [12]. My previous work [7] and [10] are addressing the issues of customer right’s and unbinding problem. It also solves buyer verification and certification authority obligation problem. William etl [14] introduced the concept of rigorous analysis of buyer-seller watermarking protocols using a formal analysis technique used to check communication protocols. All these system have miserably failed to identify the culpit if the embedded copyrighted watermarking content on the © 2011 ACEEE 51 DOI: 01.IJNS.2.4.51 digital content is changed or hacked. Even though many solutions are proposed for many issues of privacy and buyer-seller with watermarking, no effort has made to identify the perpetrator of the piracy. Buyerseller protocol in this paper is a novel method for protecting the privacy and locate the original perpetrator who actually pirated the digital content. The proposed system alerts the copyright owner regarding the geographical and network location of the perpetrator, as soon as privacy is encountered. II. PROPOSED SYSTEM The proposed protocol mainly address the issue to identify the perpetrator, as soon as privacy is encountered. The proposed model based on any public key cryptosystem has five different roles as follows. 1. O: The copyright owner of the licensed digital content, who wants to sell the product through the seller or dealer. 2. S: The seller or the sales point, from where the buyer purchases the digital content. The seller may be the original owner of the digital content, or an authorized reselling agent or dealer. 3. B: The genuine buyer, who wants to purchase a digital content from the seller S. 4. H: The present holder of the digital content who is processing the pirated watermarked content. 5. CA: The Watermark Certification Authority is responsible for issuing watermark based on Transaction Identification number (TID), Holder’s MAC, Holder ’sPublic key (Ps), and Product Identification number (PID). The WCA also issues the digital signature certificate based on private key in such a way that anyone in the electronics commerce transaction can check the authenticity to avoid any future repudiation. They may appoint trusted Regional Watermark Certification Authorities (RWCA) to share and reduce its workload. 6. ARB: An arbiter, who adjudicates lawsuits against the infringement of copyright and intellectual property. This paper restricts itself to further discussion on security or implementation issues related to the public key cryptosystem by assuming that a public key infrastructure has been well deployed so that each party has its own public-private key pair as well as a digital signature certificate issued by WCA. Before elaborating further on the proposed protocol, the notations used in this model are defined below.
  • 2. Full Paper ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 X W Original copy of the digital content Generated Watermark, which is to be embedded into the digital content X MAC Media Access Control (MAC) address of the networking device is used for generating the watermarking. MAC is also used identify the perpetrator. PID Unique number given by the CA to identify a digital product, which will be published in website for anyone who is likely to take part in the transaction. TID The CA is responsible for issuing a unique random number for every transaction, in order to prevent the duplication when selling more copies of a digital content to a specific B by aSor O. TSR A kind of a Terminate and Stay Resident (TSR) scripting program that can access MAC of the system to compare the same in the watermarked content. No access to memory or processing or any other system unit. The TSR will active till the digital content is WID Watermark Identification number is generated by CA, which is only known to CA for verifying the originality of the purchased product. WID will be stored in a database along with TID, PID, B, S details.  Watermark information binary insertion operator, which inserts watermark into the original copy of digital content. X Watermarked digital content, where the watermark W is inserted into the digital content X using a function , (XW). (PS, SS) A public-secret key pair, where PS is S’s public key and SS is S’s secret key. Public key encryption and decryption algorithms EPb(M) The message M is encrypted using B’s public key DSca(C) The cipher text C is decrypted using CA’s private key By XW means, where W = (WSWB) x1w1, x2w2 …….. xnwn, x n+1w n+1 …….. xmwm} A privacy homomorphism with respect to the binary operator  is applied to insert a watermark W to any original copy of the digital content X. For every a and b in the message block,  has the property that EPK (a  b) = EPK (a)  EPK (b) where PK is the public encryption key. The buyer-seller protocol in this section, using watermark techniques for an efficient and secure digital transaction, has five sub-protocols: Registration and Buyer-Seller Protocol, TSR Watermarking, Perpetrator Alert, Arbitration Protocol and Relocation Request. where the O registers a digital content, to be sold, with the Certification Authority (CA) with the Product ID number, PID. Once the O reaches to an agreement on the terms and conditions regarding price and service with the seller or dealer S, it will request the CAto issue the digital marked content to S with their Media Access Control address, MACo, and public key,Po for the a specific product transaction, TID. Fig. 1 Registration and Buyer-Seller protocol Figure 2 has the details of possible transactions in the proposed registration and Buyer-Seller protocol, which is explained below: 1. When O wants to sell a digital content over an internet, first it has to register with CAwith the product Identification number, PID, and the Public Key Po. O initiates the registration transaction by sending an encrypted PID and P o with CA’s publ ic key, EPca(PID+PS). 2. CA generates the unique watermarking after collecting the MACo, Poand Transaction identification number, TID. The this watermark is combined with the TSR scripting program EPo[XTSRW(MACo, TID, Po)] All these details are stored in the CA’s database, and it is only known to CA and corresponding arbitrator ARB. 3. O will identify, negotiate, and finalize the terms and conditions of the possible dealers, D or a Seller, S; to possibly identify the genuine Buyers, B. 4. O will request CA to issue the watermarked content of PIDto S.Epca(Ps, PID) 5. CAidentifies the MAC of S and issues the watermarked content to S, for possible display and identification of the genuine Buyers, B EPs[X  TSR W(MACs, TID, Ps)] 6. CA sends the acknowledgement, EPo[ACK(Ps, PID)], to O regarding the watermarked PID to S. 7. Osends the acknowledgement, EPs[ACK(Ps, PID)], to S regarding the watermarked PID from CA. 8. S will identify, negotiate, and finalize the payments with the genuine Buyers, B. 9. S will request CA to issue the watermarked content of PIDto B.Epca(Pb, PID) 10. CA identifies the MAC of B and issues the watermarked content to B. EPb[X  TSR W(MACb, TID, Pb)] 11. CA sends the acknowledgement, EPs[ACK(Pb, PID)], to A. Registrationand Buyer-Seller Protocol Figure 1 shows the proposed registration protocol for any buyer-seller networking transaction using watermarking, © 2011 ACEEE DOI: 01.IJNS.2.4.51 52
  • 3. Full Paper ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 Fig. 2 Transactions in the Registration and Buyer-Seller Protocol S regarding the watermarked PID to B. 12. Ssends the acknowledgement, EPb[ACK(Pb, PID)], to B regarding the watermarked PID from CA. At the end of the registration and buyer-seller protocol, S is authorized to sell the product PID, by O; and S identifies the buyer B to sell the watermarked product through CA. Third layer of the TSR watermarking is the actual watermark information where PH,PID and other information is embedded to solve numerous other issues resolved till now. C. Perpetrator Alert The Figure 5 shows the Alert mechanism implanted in the watermarked content with the help of TSR, when a piracy is observed. B. TSR Watermarking Figure 3 shows the TSR watermarking in 3 layers. The base layer is the actual digital content X to be sold. Layer 2 is the flag checking TSR scripting program, generated by the CA, which will contain encrypted static 10 flag counters (as shown in the Figure 4) to store the required information to check the piracy.The TSR(runs itself and checks in every minute or hour or day as the security of the content demands) will access the MAC of the existing place of digital content and check the flag of the digital content with the help of KEY and PH. If anyone tries to duplicate the content the CARRY and KEY changes, and alert generates. If an unauthorized person is holding the content without duplicating, then the PH (when decrypting the SH) and MAC changes will be noticed. The system implementers have every freedom to design the Flag Counters to maximize the security. Fig. 5 Perpetrator Alert Piracy can be detected in three cases by the TSR by looking at the flags, MAC and Watermarked contents. Case(1): where the holder, H, of the digital content is carrying the original digital content intended for another genuine buyer, B. TSR will detect this by checking the MAC of the holder. In this case H may not be able to use the digital content as H will not be able to decrypt using the SH , and requires SB.Case(2): where the holder, H, of the digital content is carrying the duplicate digital content. The CARRY and KEY flag might have changed when duplicating the content. Apart from that MAC and PB will differ.Case(3): where the genuine buyerB, of the digital content duplicated the original content. TSR will identify and alertthe CARRY and KEY flag which is changed when duplicating the content. The alert (IP and MAC address of the H, PID, Po, PS, PH, TID) is often sent to the O of the digital content and ARB. Fig. 3 TSR watermarking in 3 Layer D. Arbitration Protocol The information related to the licensed owner, O, and corresponding arbitrator, ARB, information is stored in the Fig. 4 Static Flag Counters in the TSR Layer © 2011 ACEEE DOI: 01.IJNS.2.4.51 53
  • 4. Full Paper ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 watermark. Tampering this information will destroy (completely or partially) the digital content. As soon as piracy is observed, an alert is initiated to the O of the digital content and ARB. The ARB further monitors and checks the IP & MAC address using the existing network tracking system to trace down the perpetrator. REFERENCES [1] Poh, G.S., Martin, K.M, “A framework for design and analysis of asymmetric fingerprinting protocols”,Third International Symposium on Information Assurance and Security, pp. 457– 461 (2007) [2] N Memon and P W Wong, “Protecting Digital Media Contents,” Commun. ACM, Vol 41, No. 7, July 1998, pp. 35-43. [3] N Memon and P W Wong, “A Buyer-Seller Watermarking Protocol,” IEEE Trans. on Image Processing, Vol. 10, Apr. 2001, pp. 643-649. [4] L Qiao and K Nahrstedlt, “Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Right,” J. of Visual Communication and Image Representation, Vol. 9, Sept. 1998, pp. 194-210. [5] Shao, M.H.: A privacy-preserving buyer-seller watermarking protocol with semi trust third party”, Proceeding of TrustBus’07, Volume 4657, Springer LNCS, page 44-53., (2007) [6] Lei C-L, Yu P-L, Tsai P-L and Chan M-H, “An Efficient and Anonymous Buyer-Seller Watermarking Protocol,” IEEE Trans. on Image Processing, Vol. 13, No.12, 2004, pp. 16181626. [7] Vinu V Das and NessyThankachan, “A Buyer-Seller Watermarking Protocol for an Efficient and Secure Digital Transaction,” in Proc. 1 st Int. Conf. on Information System and Technology, India, 2007, pp. 127-132. [8] K Gopalakrishnan, N Memon, and PL Vora, “Protocols for Watermark Verification,” IEEE Multimedia, Vol. 8, Oct-Dec 2001, pp. 66-70. [9] J Zhang, W Kou and K Fan, “Secure Buyer-Seller Watermarking Protocol,” IEE Proc. Int. Conf. Security, Vol. 153, No. 1, March 2006. [10] Vinu V Das, “A Tree Based Buyer-Seller Watermarking Protocol,” in Proc. 3 rd Int. Joint Conf. on Computer, Information, Systems Sciences, and Engineering, USA, 2007. [11] Goi B-M, Phon R C-W, Yang Y, Bao F, Deng R H, and Siddiqi M U, “Cryptanalysis of two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for true Anonymity,” in Proc. Applied Cryptography and Network Security, 2004, LNCS 3089, pp. 369-382. [12] I M Ibrahim, SherifHazem N E-D, and Abdel Fatah A H, “ An Effective and Secure Buyer-Seller Watermarking Protocol,” IEEE Proc. 3rd Int. Symposium of Information Assurance and Security, 2007, pp. 21-26. [13] Chang C-C and Chung C-Y, “An Enhanced Buyer Seller Watermarking Protocol,” in Proc. of ICCT 2003, IEEE CS Press, 2003, pp. 1779-1783. [14] Williams, DM,Treharne, H,Ho, ATSand Culnane, C, “Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol”,ACM Multimedia and Security Workshop, 2008 E. Relocation Request Figure 6 illustrates how to handle the relocation of the digital content request. There is always a possibility that genuine buyer may change the geographical location or the computer or the working and storing device. In such cases all the purchases will have to be surrendered to CA at transaction (1) with the new MAC address, to relocate to new device or location. Newly embedded digital content will be send to B in the transaction (2); which will be later forwarded to transaction (3). Fig 6 Relocation Request Since the O and ARB gets the alert as soon as piracy observed, a proactive action and prevention against duplication, which will ultimately lead to copyright protection. III. CONCLUSION This paper proposed an efficient and secure buyer-seller watermarking protocol to identify the Perpetrator who actually pirates the digital content. All the existing system can be implemented in layer 3 of watermarking to solve the existing many issues stated by other researched in this field.The system is designed for any public key crypto system to restrict the unauthorized data drift.The security of this protocol lies on the efficient algorithm of TSR scripting program and flag counters. The security and robustness of the encryption standard and different homomorphism, permutation and combination functions used in this protocol also plays an important role, which can further be modified and developed to improve the efficiency of the protocol. © 2011 ACEEE DOI: 01.IJNS.2.4.51 54