A secure watermarking scheme for buyer-seller identification and copyright protection

被引:0
|
作者
Ahmed, Fawad [1 ]
Sattar, Farook [1 ]
Siyal, Mohammed Yakoob [1 ]
Yu, Dan [1 ]
机构
[1] School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore 639798, Singapore
关键词
We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issuesbuyer-seller identification; copyright infringement; and ownership verification. By buyer-seller identification; we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement; our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated; and further prove this fact to a third party. For multiple ownership claims; our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme; but it also enables to associate identities of buyer/seller with their respective watermarked images. Copyright © 2006 Hindawi Publishing Corporation. All rights reserved;
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
相关论文
共 50 条
  • [21] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [22] An efficient and impartial buyer-seller watermarking protocol
    School of Information Science and Engineering, Qufu Normal University, Rizhao
    Shandong
    276826, China
    不详
    Shandong
    276826, China
    J. Commun., 5 (339-344):
  • [23] Bandwidth efficient buyer-seller watermarking protocol
    Xu, Zhongqiu
    Li, Liangju
    Gao, Haibo
    International Journal of Information and Computer Security, 2012, 5 (01) : 1 - 10
  • [24] A secure watermarking scheme for copyright protection
    Zhang, JS
    Tian, L
    Tai, HM
    Wang, CJ
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXVII, PTS 1AND 2, 2004, 5558 : 867 - 873
  • [25] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [26] Buyer-seller watermarking protocol: Problems and solutions
    Chen, Dangui
    Zeng, Xiliang
    International Review on Computers and Software, 2012, 7 (03) : 1204 - 1208
  • [27] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [28] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557
  • [29] An efficient buyer-seller watermarking protocol with multicast
    Hu, Defa
    Luo, Juanjuan
    International Review on Computers and Software, 2011, 6 (03) : 389 - 392
  • [30] An efficient and anonymous buyer-seller watermarking protocol
    Lei, CL
    Yu, PL
    Tsai, PL
    Chan, MH
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) : 1618 - 1626