Algebraic aspects of cryptography
Algebraic aspects of cryptography
Independent component analysis: theory and applications
Independent component analysis: theory and applications
High-order contrasts for independent component analysis
Neural Computation
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
RSA security's official guide to cryptography
RSA security's official guide to cryptography
Digital watermarking
If one watermark is good, are more better?
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
A new blind watermarking technique based on independent component analysis
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
An asymmetric watermarking method
IEEE Transactions on Signal Processing
A robust protocol for proving ownership of multimedia content
IEEE Transactions on Multimedia
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Hi-index | 0.00 |
We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues--buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.