Managing Copyright in Open Networks
IEEE Internet Computing
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
A secure watermarking scheme for buyer-seller identification and copyright protection
EURASIP Journal on Applied Signal Processing
Secure multimedia authoring with dishonest collaborators
EURASIP Journal on Applied Signal Processing
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
International Journal of High Performance Computing and Networking
A distributed DRM platform based on a web-oriented watermarking protocol
SEPADS'06 Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Proceedings of the 10th ACM workshop on Multimedia and security
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
Information Security and Cryptology
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Copyright protection protocols for copyright protection issues
WSEAS Transactions on Computer Research
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Mobile 3D Game Contents Watermarking Based on Buyer-Seller Watermarking Protocol
IEICE - Transactions on Information and Systems
An enhanced secure buyer-seller watermarking protocol
Proceedings of the International Conference on Advances in Computing, Communication and Control
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Buyer seller watermarking protocol for digital rights management
Proceedings of the 2nd international conference on Security of information and networks
On the implementation of the discrete Fourier transform in the encrypted domain
IEEE Transactions on Information Forensics and Security
Improving a Digital Rights Management Scheme for Video Broadcast
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A CRT based watermark for multiparty multilevel DRM architecture
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Watermarking protocol for protecting user's right in content based image retrieval
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Composite signal representation for fast and storage-efficient processing of encrypted signals
IEEE Transactions on Information Forensics and Security
Security of a leakage-resilient protocol for key establishment and mutual authentication
ProvSec'07 Proceedings of the 1st international conference on Provable security
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Encrypted domain DCT based on homomorphic cryptosystems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
A proposed digital rights management system for 3D graphics using biometric watermarks
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
MM '11 Proceedings of the 19th ACM international conference on Multimedia
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
An effective and dynamically extensible DRM web platform
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A digital watermarking scheme for personal image authentication using eigenface
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Proceedings of the 20th ACM international conference on Multimedia
Bandwidth efficient buyer-seller watermarking protocol
International Journal of Information and Computer Security
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
IH'12 Proceedings of the 14th international conference on Information Hiding
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Reversible data hiding in encrypted images using pseudorandom sequence modulation
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An improved algorithm for reversible data hiding in encrypted image
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A novel JFE scheme for social multimedia distribution in compressed domain using SVD and CA
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.01 |
Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper, we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller