Cloud-based Buyer-Seller Watermarking Protocols

被引:0
|
作者
Peng, Yi-Jia
Hsieh, Yung-Chen
Hsueh, Chih-Wen
Wu, Ja-Ling
机构
关键词
Asymmetric Fingerprinting; Buyer-seller Watermarking Protocol; Improved-spread-spectrum Watermarking; Secure Client-side Embedding; Cloud Computing Environment;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we expand the well-known Buyer-Seller protocol to Cloud computing environment, in which the well-performed improved spread spectrum watermarking scheme is included to enhance the overall system performance. Depending on the service mode the Cloud provided, two Cloud-based Buyer-Seller protocols are proposed. In the first Cloud based Buyer-Seller protocol, Cloud behaves as a service infrastructural provider. That is, Seller uses Cloud to speed up his watermark embedding process and save storage and bandwidth costs required to store and to deliver encrypted contents. In the second protocol, Cloud behaves as a service platform provider. That is, Cloud behaves as an E-commerce platform to activate the content transaction between Seller and Buyer directly. Owing to Clouds great computation power and its very economical Pay-as-you-go business model, with the aid of the proposed Buyer-Seller protocols, we can build an efficient, effective, fair and secure Cloud-based E-commerce platform for media trading.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [2] Towards transferable watermarks in buyer-seller watermarking protocols
    Terelius, Bjorn
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 197 - 202
  • [3] Formal Analysis of Two Buyer-Seller Watermarking Protocols
    Williams, David M.
    Treharne, Helen
    Ho, Anthony T. S.
    Waller, Adrian
    DIGITAL WATERMARKING, 2009, 5450 : 278 - +
  • [4] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) : 643 - 649
  • [5] A buyer-seller watermarking protocol
    Memon, N
    Wong, PW
    1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 291 - 296
  • [6] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [7] A Tree Based Buyer-Seller Watermarking Protocol
    Das, Vinu V.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 553 - 557
  • [8] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [9] Buyer-seller watermarking protocols with off-line trusted parties
    Fan, Chun-, I
    Chen, Ming-Te
    Sun, Wei-Zhe
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1035 - +
  • [10] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity
    Deng, Mina
    Preneel, Bart
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +