2012
DOI: 10.1504/ijics.2012.051079
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth efficient buyer-seller watermarking protocol

Abstract: Digital watermarking has been used widely for the purposes of copyright protection and copy deterrence for multimedia content. In a forensic watermarking architecture, a buyer-seller watermarking protocol can enable a seller to identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Existing schemes are inefficient in practice for their high bandwidth usage. This paper proposes a buyer-seller watermarking protocol that is efficient from the bandwidth usage point of v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…However, in the last years, new experiences have been conducted in developing watermarking protocols. Most of them are based on the removal of WCAs from the protocols [30,31,32,33,34], since such authorities could give rise to potential collusion actions with buyers or sellers [35,36,37], thus weakening the security of the protocols. Nonetheless, the result of such experiences is often represented by inefficient watermarking protocols unsuited for the current web context, in which buyers are forced to perform complex security actions, if they want to complete their purchase transactions.…”
Section: Approach Based On Watermarking Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in the last years, new experiences have been conducted in developing watermarking protocols. Most of them are based on the removal of WCAs from the protocols [30,31,32,33,34], since such authorities could give rise to potential collusion actions with buyers or sellers [35,36,37], thus weakening the security of the protocols. Nonetheless, the result of such experiences is often represented by inefficient watermarking protocols unsuited for the current web context, in which buyers are forced to perform complex security actions, if they want to complete their purchase transactions.…”
Section: Approach Based On Watermarking Protocolsmentioning
confidence: 99%
“…Even if a watermarking protocol solves the problems reported above, it has also to face the challenges posed by the current trends in the field of copyright protection of digital content distributed on the Internet [23,30,32,33,34,40,41,42,43,45,46,47,56,57,58].…”
Section: Design Challengesmentioning
confidence: 99%
“…However, such a solution is not always possible, since protocols often need TTPs to validate specific data, or some phases of the protocol, or, for example, the plug-ins that have to be downloaded and installed in the buyers' web browsers to complete the purchase transactions [22,23]. Furthermore, when TTPs play a limited role in the protocols, buyers end up being forced to perform complex security actions to complete the purchase transactions, and this makes the protocols impractical for the web context [17][18][19][20][21][40][41][42][43][44].…”
Section: Main Challengesmentioning
confidence: 99%
“…However, the introduction of WCAs can reduce the security level of the protocols, since TTPs can give rise to potential collusive behaviors with buyers or sellers [2,16]. As a consequence, a number of watermarking protocols are based on "simplified" interaction schemes that do not exploit WCAs [17][18][19][20][21]. Such approaches appear to be more secure, but they turn out to be impracticable in the current web context, since they are characterized by interaction schemes that force buyers to perform complex security actions to complete content purchase transactions [22].…”
Section: Introductionmentioning
confidence: 99%
“…Reversible watermarking is designed so that it can be removed completely to restore the original image (Thodi and Rodriguez, 2007;Alattar, 2004;Ni et al, 2006;Vleeschouwer et al, 2001;Weng et al, 2008;Lee et al, 2007). Considering the age of reversible watermarking which is just a decade to count, it has fetched enormous attention of researchers to boost of (Mehta et al, 2012;Xu, 2012). In reversible watermarking, we embed a watermark in a digital image I, and obtain the watermarked image I′.…”
Section: Introductionmentioning
confidence: 99%