Fingerprinting long forgiving messages
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Digital watermarking
Protection of Computer Software: Its Technology and Application
Protection of Computer Software: Its Technology and Application
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract)
STACS '97 Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proving Ownership of Digital Content
IH '99 Proceedings of the Third International Workshop on Information Hiding
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
A Buyer–Seller Watermarking Protocol Based on Secure Embedding
IEEE Transactions on Information Forensics and Security
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
IEEE Transactions on Image Processing
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.01 |
Buyer-seller watermarking (BSW) protocols allow copyright protection of digital content. The protocol is anonymous when the identity of buyers is not revealed if they do not release pirated copies. Existing BSW protocols are not provided with a formal analysis of their security properties. We employ the ideal-world/real-world paradigm to propose a formal security definition for copyright protection protocols, and we analyze an anonymous BSW protocol and prove that it fulfills our definition. Additionally, we implement the protocol and measure its efficiency.