• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 219
Next 10 →

Anonymous buyer-seller watermarking protocol with additive homomorphism

by Mina Deng, Li Weng, Bart Preneel - In Proc. of International Conference on Signal Processing and Multimedia Applications , 2008
"... Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorph ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive

A buyer-seller watermarking protocol

by Nasir D. Memon, Available Nasir, D. Memon, Nasir Memon, Ping Wah Wong - IEEE Transactions on Image Processing , 2001
"... Digital watermarks have recently been proposed for the purposes of copy protec-tion and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of t ..."
Abstract - Cited by 61 (1 self) - Add to MetaCart
(for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content

Formal Analysis of Two Buyer-Seller Watermarking Protocols

by David M. Williams, Helen Treharne, Anthony T. S. Ho, Adrian Waller
"... Abstract. In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we mode ..."
Abstract - Add to MetaCart
Abstract. In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we

An efficient and anonymous buyer–seller watermarking protocol

by Chin-laung Lei, Pei-ling Yu, Pan-lung Tsai, Ming-hwa Chan - IEEE Trans.Image Process
"... Abstract—For the purpose of deterring unauthorized duplica-tion and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia con-tents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the r ..."
Abstract - Cited by 25 (0 self) - Add to MetaCart
to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol. Index Terms—Copyright protection, digital watermark, privacy, security.

Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol

by Neelesh Mehra, Dr. Madhu Sh
"... A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all of ..."
Abstract - Add to MetaCart
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all

An efficient buyer-seller watermarking protocol based on composite signal representation

by Mina Deng, Tiziano Bianchi, Alessandro Piva, Bart Preneel - in Proc. 11th ACMWorkshop on Multimedia and Security., Princeton, NJ,2009
"... Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal repr ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and An Improvement for True Anonymity

by Raphael C. −w. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi - Proceedings of ACNS ’04, LNCS 3089
"... Abstract. By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and C ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Abstract. By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al

A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform

by Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar
"... Digital watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital c ..."
Abstract - Add to MetaCart
contents. It plays a very important role in E-commerce. Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. It uses the public key encryption

Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol

by David M. Williams, Helen Treharne, Chris Culnane - In 10th ACM Workshop on Multimedia and Security , 2008
"... In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6

Efficient Implementation of a Buyer-Seller Watermarking Protocol Using a Composite Signal Representation

by Mina Deng, Tiziano Bianchi, Ro Piva, Bart Preneel
"... Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic public ..."
Abstract - Add to MetaCart
Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic
Next 10 →
Results 1 - 10 of 219
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University