2020
DOI: 10.2174/2352096513999200623121213
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain Based Buyer-seller Watermark Protocol with Trustless Third Party

Abstract: Background: With the development and innovation of digital information technologies and new-generation Internet information platforms, new types of information exchange methods have been spawned. It has broken the restriction of the traditional internet boundary, and integrated all round connections between people and objects. Methods: Based on the above progresses, digital multimedia contents distributed or published much more convenient on the internet than before and most of them without any copyright p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…− By referring to the singular vector of the original image (SI) and the descaling factor (k), extract the watermark's singular vector (SI") (12).…”
Section: Watermark Validationmentioning
confidence: 99%
See 2 more Smart Citations
“…− By referring to the singular vector of the original image (SI) and the descaling factor (k), extract the watermark's singular vector (SI") (12).…”
Section: Watermark Validationmentioning
confidence: 99%
“…− The requester decomposes the tested image using DCT-SVD and encrypts the singular matrix using the authority's public key (PkA) into SAI". − The requester extracts the embedded watermark using (11,12,13) and generate the inverse SVD of it (W"A). − The authority computes watermark similarity and its quality by comparing the extracted watermark.…”
Section: Ckks-encrypted Watermarking Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though the watermarking protocols that do without TTPs appear to be more secure [13,14,17], they are often affected by usability problems. Indeed, the absence of TTPs ends up complicating the participation of buyers in the protocols, forcing buyers to carry out complex actions.…”
Section: Conspiracy Problemmentioning
confidence: 99%