An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Secure client-side ST-DM watermark embedding
IEEE Transactions on Information Forensics and Security
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
A fair online payment system for digital content via subliminal channel
Electronic Commerce Research and Applications
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
Hi-index | 0.00 |
In a forensic watermarking architecture, a buyer-seller protocol protects the watermark secrets from the buyer and prevents false infringement accusations by the seller. Existing protocols encrypt the watermark and the content with a homomorphic public-key cipher and perform embedding under encryption. When used for multimedia data, these protocols create a large computation and bandwidth overhead. In this correspondence, we show that the same functionality can be achieved efficiently using recently proposed secure watermark embedding algorithms.