2016
DOI: 10.1007/s11042-016-4247-8
|View full text |Cite
|
Sign up to set email alerts
|

A buyer-seller watermarking protocol for digital secondary market

Abstract: In the digital right management value chain, digital watermarking technology plays a very important role in digital product's security, especially on its usage tracking and copyrights infringement authentication. However, watermark procedures can only effectively support copyright protection processes if they are applied as part of an appropriate watermark protocol. In this regard, a number of watermark protocols have been proposed in the literature and have been shown to facilitate the use of digital watermar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…The detailed step to implement DCT-SVD watermarking is as. − Transform the original image (I) using DCT (5) and decompose the result using SVD operation to retrieve three matrices, the orthogonal matrices UI and VhI and a singular vector SI (6).…”
Section: Dct-svd Watermarking 221 Watermark Embeddingmentioning
confidence: 99%
See 1 more Smart Citation
“…The detailed step to implement DCT-SVD watermarking is as. − Transform the original image (I) using DCT (5) and decompose the result using SVD operation to retrieve three matrices, the orthogonal matrices UI and VhI and a singular vector SI (6).…”
Section: Dct-svd Watermarking 221 Watermark Embeddingmentioning
confidence: 99%
“…Several works proposed secure and transparent methods for web-based watermarking protocols, either by using trusted authority [4]- [6] or client-side embedding [7]- [10]. Despite the efforts, the works cannot provide full transparency for the watermarking process.…”
Section: Introductionmentioning
confidence: 99%
“…The use of the smart contract enables the watermark protocol to perform transaction process in real time, efficiently and automatically. The proposed watermarking protocol is based on our previous work [27] and also draws on the experience of Frrattoillo's work [21] which aims: 1. To fulfil the buyer-seller requirement with trustless third party 2.…”
Section: Main Goalmentioning
confidence: 99%
“…The dishonest owner could distribute the copy of digital content freely without reduce any quality. Currently, there is only one watermark protocol research paper introduce the experience for the second-hand and thirdhand market [27]. Further standardized and develop the second-hand market would make a contribute to protect the rights and interests of different parties.…”
Section: Comparison With Other Protocolsmentioning
confidence: 99%