2005
DOI: 10.1109/tip.2005.859383
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting protocol for images based on additive homomorphic property

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 116 publications
(103 citation statements)
references
References 18 publications
0
103
0
Order By: Relevance
“…The multiplicative property of RSA scheme Rivest et al (1978) is applied to embed a fingerprint in Memon & Wong (2001), the homomorphism of a bit commitment scheme based on the quadratic residues Brassard et al (1988) is exploited Pfitzmann & Sadeghi (1999;, and the additive homomorphic property of public-key cryptosystem such as Okamoto-Uchiyama encryption scheme Okamoto & Uchiyama (1998) and Paillier cryptosystem Paillier (1999) is utilized in Kuribayashi & Tanaka (2005). In these schemes, to convince a seller that a transmitted ciphertexts really contains his fingerprinting information, zero-knowledge interactive protocol (ZKIP) must be performed, which is easily constructed using the applied public-key cryptosystem.…”
Section: Asymmetric Propertymentioning
confidence: 99%
See 4 more Smart Citations
“…The multiplicative property of RSA scheme Rivest et al (1978) is applied to embed a fingerprint in Memon & Wong (2001), the homomorphism of a bit commitment scheme based on the quadratic residues Brassard et al (1988) is exploited Pfitzmann & Sadeghi (1999;, and the additive homomorphic property of public-key cryptosystem such as Okamoto-Uchiyama encryption scheme Okamoto & Uchiyama (1998) and Paillier cryptosystem Paillier (1999) is utilized in Kuribayashi & Tanaka (2005). In these schemes, to convince a seller that a transmitted ciphertexts really contains his fingerprinting information, zero-knowledge interactive protocol (ZKIP) must be performed, which is easily constructed using the applied public-key cryptosystem.…”
Section: Asymmetric Propertymentioning
confidence: 99%
“…The idea of the protocol Kuribayashi & Tanaka (2005) is to exploit the public-key cryptosystem with additive homomorphic property such as the Okamoto-Uchiyama encryption scheme Okamoto & Uchiyama (1998) and Paillier cryptosystem Paillier (1999) for anonymous fingerprinting.…”
Section: Asymmetric Fingerprinting Protocol Based On Additive Homomormentioning
confidence: 99%
See 3 more Smart Citations