Efficient Smart-Card Based Anonymous Fingerprinting
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
Digital Watermarking and Steganography
Digital Watermarking and Steganography
P2P commercial digital content exchange
Electronic Commerce Research and Applications
Coin-based anonymous fingerprinting
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
A Buyer–Seller Watermarking Protocol Based on Secure Embedding
IEEE Transactions on Information Forensics and Security
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
An efficient and anonymous buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Fingerprinting protocol for images based on additive homomorphic property
IEEE Transactions on Image Processing
Hi-index | 0.24 |
In conventional multicast transmission, one sender sends the same content to a set of receivers. This precludes fingerprinting the copy obtained by each receiver (in view of redistribution control and other applications). A straightforward alternative is for the sender to separately fingerprint and send in unicast one copy of the content for each receiver. This approach is not scalable and may implode the sender. We present a scalable solution for distributed multicast of fingerprinted content, in which receivers rationally co-operate in fingerprinting and spreading the content. Furthermore, fingerprinting can be anonymous, in order for honest receivers to stay anonymous.