Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Multicasting on the Internet and Its Applications
Multicasting on the Internet and Its Applications
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
A Secure and Practical Buyer-Seller Watermarking Protocol
MINES '09 Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 02
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
International Journal of Information and Computer Security
Watermarking Protocol for Web Context
IEEE Transactions on Information Forensics and Security - Part 1
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Fingerprinting protocol for images based on additive homomorphic property
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Digital watermarking has been used widely for the purposes of copyright protection and copy deterrence for multimedia content. In a forensic watermarking architecture, a buyer-seller watermarking protocol can enable a seller to identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Existing schemes are inefficient in practice for their high bandwidth usage. This paper proposes a buyer-seller watermarking protocol that is efficient from the bandwidth usage point of view. First, multicast that is an efficient transport technology for one-to-many communication is exploited, which can reduce the bandwidth usage significantly. Second, symmetric encryption instead of public-key encryption is performed on the multimedia content, which also can reduce the complexity and communication cost.