Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Protecting digital media content
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Modulation and Information Hiding in Images
Proceedings of the First International Workshop on Information Hiding
Recovery of Watermarks from Distorted Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
If one watermark is good, are more better?
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
An asymmetric watermarking method
IEEE Transactions on Signal Processing
A robust protocol for proving ownership of multimedia content
IEEE Transactions on Multimedia
Constraint-based watermarking techniques for design IP protection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Hi-index | 0.00 |
With the pervasiveness of internet, businesses online have become ubiquitous. The proposed concept is a solution with a specific focus on preventing disputes that comes out of ownership claims through buying and selling digital documents. The concept proposed offers a dependable watermarking method that can help authenticate sellers and buyers of digital documents. The important issues of copyright protection such as buyer-owner identification, copyright infringement, and ownership verification are addressed. Embedding the owners' and buyers' identities through watermarks and provisions for revealing the same as proof to substantiate the ownership rights of buyer over the digital document, will serve as a solution for issues arising out of buyer owner identification. To solve copyright infringement issues, the concept offers necessities that can help the owner to identify the buyer, from whom the illegal copies of the documents originated. The provisions to identify the legal owner of the digital document, can settle controversies regarding multiple ownership claims in the court of law. The usage of DCT-SVD based watermarking and public key encryption with hash values fortifies the scheme and makes it a fail-safe method.