Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
Copyright protection of images using robust digital signatures
ICASSP '96 Proceedings of the Acoustics, Speech, and Signal Processing, 1996. on Conference Proceedings., 1996 IEEE International Conference - Volume 04
Robust watermarking based on DWT and nonnegative matrix factorization
Computers and Electrical Engineering
A real-time video watermarking system with buffer sharing for video-on-demand service
Computers and Electrical Engineering
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Chaos-based discrete fractional Sine transform domain audio watermarking scheme
Computers and Electrical Engineering
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
CW '09 Proceedings of the 2009 International Conference on CyberWorlds
Invariant image watermarking using multi-scale Harris detector and wavelet moments
Computers and Electrical Engineering
Non-invertible DWT domain image watermarking using human visual model
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.00 |
Digital watermarking techniques are a means of protecting the copyrights of digital contents. In this paper, we propose an identity-based (ID-based) digital watermarking protocol and point out several previously unpublished flaws in Hwang et al. (2005)'s scheme. We hope that by identifying the design flaws, similar structural mistakes can be avoided in future designs. We also claim that our proposed digital watermarking scheme can effectively solve the problem of multiple claims of ownership, and is suitable for any practical and secure watermarking algorithm.