2009 International Conference on Multimedia Information Networking and Security 2009
DOI: 10.1109/mines.2009.132
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Practical Buyer-Seller Watermarking Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The unbinding problem has been concerned and a number of subsequent watermark protocols work on it which includes [5,7]. But, these protocols are affected by the double watermark insertion problem [3]. Double watermark insertion as an accepted and suitable solution for solving the unbinding problem.…”
Section: Comparison With Other Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…The unbinding problem has been concerned and a number of subsequent watermark protocols work on it which includes [5,7]. But, these protocols are affected by the double watermark insertion problem [3]. Double watermark insertion as an accepted and suitable solution for solving the unbinding problem.…”
Section: Comparison With Other Protocolsmentioning
confidence: 99%
“…However, a limited capacity including hiding information of digital content needs to be considered. On the other hand, a single watermark insertion not only provide a robust and secure outcome, but also allow to insert long bit string codes that is particularly helpful to reach anti-collusion target [3,6,9] Compared with the above solutions, this paper also avoids conspiracy attack and protects different entities copyright by applying different encrypt algorithms. Furthermore, there are two specific functions are used to generate two binary codes which are then combined to produce a single watermark.…”
Section: Comparison With Other Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The first solution on single watermark insertion schemes is introduced in [33]. This protocol solves the major and most common problems documented in the literature, it does not require the buyer to have any knowledge of cryptography and watermarking, and it avoids the double watermark problem by adopting a single-watermark approach, and is not limited to linear watermarking schemes.…”
Section: A Comparison With Other Protocolsmentioning
confidence: 99%
“…The former wishes to get content from a web content provider, whereas the latter wishes to release it in a digitally protected form obtained by inserting a watermark. In particular, the early experiences also involve specific trusted third parties (TTPs), called "watermark certification authorities" (WCAs), whose main function is to guarantee the correct execution of the protocols [4,[10][11][12][13][14][15]. However, the introduction of WCAs can reduce the security level of the protocols, since TTPs can give rise to potential collusive behaviors with buyers or sellers [2,16].…”
Section: Introductionmentioning
confidence: 99%