A lightweight buyer-seller watermarking protocol based on time-stamping and composite signal representation


  • Ashwani Kumar
  • Paras Jain
  • Jabir Ali
  • Shrawan Kumar
  • John Samuel Babu






Linear operation, encrypted signal, composite signal representation, time-stamp, public key cryptosystem,


The protocol allows a content provider to detect duplicate copy of a digital content and restrict the content provider who blames the innocent customer. This paper, proposed a lightweight protocol, which uses composite signal representation and time-stamping for watermark embedding and extraction. We have used timestamp, which tells at what time the digital content was created, signed or verified to digital watermarking algorithms and uses the composite signal representation for minimizing the overhead and bandwidth due to the use of composite signals. The suggested protocol uses composite signal representations and timestamp based methods with digital watermarking scheme for content authentication. Our watermark embedding and detection   algorithm achieves a balance between robustness and image visual quality.     Simulation results demonstrate that the algorithm used by proposed protocol has an increase robustness and good quality of watermark images as well and withstand against various image-processing attacks.



[1] F. Mintzer., G. W. Braudaway.: If one watermark is good, are more better?, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’99), 4, pp. 2067–2069, (1999).

[2] P. W. Wong., N. Memon.: Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, 10 (2001).

[3] C.-L Lei., P.-L.Yu., P.-L.Tsai., M.-H. Chan.: An efficient and anonymous buyer–seller watermarking protocol, IEEE Trans. Image Process, 13 pp. 1618–1626, (2004).

[4] A. Buldas., P. Laud., H. Lipmaa., J. Villemson.: Time-stamping with binary linking schemes, in: Advances in Cryptology—CRYPTO98, pp. 486–501, (1998).

[5] M.S. Hwang., K.F. Hwang., C.C. Chang.: A time-stamping protocol for digital watermarking. Appl Math Comput 169 pp. 1276–1284, (2005).

[6] S. Haber., W.S. Stornetta.: How to time-stamping, Journal of Cryptology 3 pp. 99–111, (1991).

[7] A. Kumar., M.D. Ansari., J. Ali., K. Kumar.: A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform. In: Das, V.V., Stephen, J., Chaba, Y. (eds.) CNC (2011).

[8] A. Kumar., V. Tyagi., M.D. Ansari., and K., Kumar.: A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform. International Journal of Computer Applications, 21(8), pp. 46-51. (2011).

[9] A. Kumar., S.P. Ghrera., V. Tyagi.: Implementation of wavelet based modified buyer-seller watermarking protocol (BSWP), WSEAS Trans. Signal Process., 10 pp. 212-220, (2014).

[10] P. Zeng., Z. Cao., K.R Choo.: An ID-based digital watermarking protocol for copyright protection. Computers and Electrical Engineering 37 pp. 526–531, (2011).

[11] Kumar, A., Ghrera, S. P., & Tyagi, V. (2015). Modified Buyer Seller Watermarking Protocol based on Discrete Wavelet Transform and Principal Component Analysis. Indian Journal of Science and Technology, 8(35), 1-9.

[12] Kumar, Ashwani, Ghrera, S.P., Vipin Tyagi, 2015. A new and efficient buyer-seller digital Watermarking protocol using identity based technique for copyright protection, Third International Conference on Image Information Processing (ICIIP), IEEE.

[13] Kumar A, Ghrera S, Tyagi V. A comparison of buyer-seller watermarking protocol (BSWP) based on discrete cosine transform (DCT) and discrete wavelet transform (DWT). Emerging ICT For Bridging The Future-Proceedings of The 49th Annual Convention Of The Computer Society Of India (CSI) Volume 1: Springer. 2015; 401–408.

[14] Ashwani Kumar, S.P Ghrera, and Vipin Tyagi, An ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection, Science & Technology, Pertanika J. Sci. & Technol. Vol. 25, no. 1, pp. 57 – 76, January 2017.

View Full Article: