A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
A distributed DRM platform based on a web-oriented watermarking protocol
SEPADS'06 Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Proceedings of the 10th ACM workshop on Multimedia and security
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
Information Security and Cryptology
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Mobile 3D Game Contents Watermarking Based on Buyer-Seller Watermarking Protocol
IEICE - Transactions on Information and Systems
An enhanced secure buyer-seller watermarking protocol
Proceedings of the International Conference on Advances in Computing, Communication and Control
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Buyer seller watermarking protocol for digital rights management
Proceedings of the 2nd international conference on Security of information and networks
On the implementation of the discrete Fourier transform in the encrypted domain
IEEE Transactions on Information Forensics and Security
Watermarking protocol for protecting user's right in content based image retrieval
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Analysis of a Buyer---Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Wireless Personal Communications: An International Journal
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
An ID-based digital watermarking protocol for copyright protection
Computers and Electrical Engineering
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
An effective and dynamically extensible DRM web platform
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A video watermarking procedure based on XML documents
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Bandwidth efficient buyer-seller watermarking protocol
International Journal of Information and Computer Security
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
An improved algorithm for reversible data hiding in encrypted image
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.01 |
For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.