Results 1 - 10
of
219
Anonymous buyer-seller watermarking protocol with additive homomorphism
- In Proc. of International Conference on Signal Processing and Multimedia Applications
, 2008
"... Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorph ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive
A buyer-seller watermarking protocol
- IEEE Transactions on Image Processing
, 2001
"... Digital watermarks have recently been proposed for the purposes of copy protec-tion and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of t ..."
Abstract
-
Cited by 61 (1 self)
- Add to MetaCart
(for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content
Formal Analysis of Two Buyer-Seller Watermarking Protocols
"... Abstract. In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we mode ..."
Abstract
- Add to MetaCart
Abstract. In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we
An efficient and anonymous buyer–seller watermarking protocol
- IEEE Trans.Image Process
"... Abstract—For the purpose of deterring unauthorized duplica-tion and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia con-tents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the r ..."
Abstract
-
Cited by 25 (0 self)
- Add to MetaCart
to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol. Index Terms—Copyright protection, digital watermark, privacy, security.
Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol
"... A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all of ..."
Abstract
- Add to MetaCart
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all
An efficient buyer-seller watermarking protocol based on composite signal representation
- in Proc. 11th ACMWorkshop on Multimedia and Security., Princeton, NJ,2009
"... Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal repr ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Buyer-seller watermarking protocols integrate watermarking tech-niques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic public-key cryptosystem and composite signal
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and An Improvement for True Anonymity
- Proceedings of ACNS ’04, LNCS 3089
"... Abstract. By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al and C ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Abstract. By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. al
A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform
"... Digital watermarking is the key technology of digital copyright protection. An efficient digital watermarking solution must tackle the problems of copyright protection and trace of pirate copy. Digital water marking is a promising technology to embed information as unperceivable signals in digital c ..."
Abstract
- Add to MetaCart
contents. It plays a very important role in E-commerce. Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy protection. It uses the public key encryption
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol
- In 10th ACM Workshop on Multimedia and Security
, 2008
"... In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6] by constructing ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
In this paper we provide a novel approach to the analysis of buyer-seller watermarking protocols by tailoring an existing formal technique that has not previously been used in this context. We accurately represent a buyer-seller watermarking protocol as proposed by Ibrahim et al. [6
Efficient Implementation of a Buyer-Seller Watermarking Protocol Using a Composite Signal Representation
"... Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic public ..."
Abstract
- Add to MetaCart
Abstract. Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protec-tion. In this paper, our main contribution is the development of an efficient buyer-seller watermarking protocol based on homomorphic
Results 1 - 10
of
219