A New and Efficient Buyer-Seller Digital Watermarking Protocol Using Identity Based Technique for Copyright Protection

被引:0
|
作者
Kumar, Ashwani [1 ]
Ghrera, S. P. [1 ]
Tyagi, Vipin [2 ]
机构
[1] Jaypee Univ Informat Technol, Dept Comp Sci, Waknaghat, HP, India
[2] Jaypee Univ Engn & Technol, Dept Comp Sci, Raghavgarh, MP, India
关键词
Identity based technique; Digital content; Public key cryptography; Digital watermarking; Copyright protection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents for copyright protection. Digital Watermarking plays a very important role in E-business. Buyer-seDer watermarking protocol is fundamentally applied to continue the digital rights of both the buyer and the seDer. In this paper, we propose a new and efficient buyer-seller digital watermarking protocol using Identity based technique for copyright protection which encountered various previously unpublished problem in J. Zhang et al. (2006)' s protocol. We ensure that by identifying these problems, mistakes can be avoided in future for implementing buyer-seller watermarking protocol. Our protocol uses Id-based public key cryptography to solve the problem of multiple claims of ownership. Hence, it examines the ownership of digital content. We have claimed that our suggested protocol is secure and flexible and turns over more protection from previous watermarking protocols, and suitable for any practical buyer seDer watermarking scheme.
引用
收藏
页码:531 / 535
页数:5
相关论文
共 50 条
  • [21] Buyer-seller watermarking protocol: Problems and solutions
    Chen, Dangui
    Zeng, Xiliang
    International Review on Computers and Software, 2012, 7 (03) : 1204 - 1208
  • [22] A secure and practical buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 105 - +
  • [23] A Verifiable and Secret Buyer-Seller Watermarking Protocol
    Chen, Chin-Ling
    Chen, Chin-Chang
    Li, De-Kui
    Chen, Po-Yueh
    IETE TECHNICAL REVIEW, 2015, 32 (02) : 104 - 113
  • [24] Research on secure buyer-seller watermarking protocol
    Quan, Liu
    Zheng, Chen
    Zude, Zhou
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 370 - +
  • [25] Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Poh, Geong-Sen
    Kim, Jongsung
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 73 - 83
  • [26] A New Buyer-Seller Watermarking Protocol Without Double Embedding
    曾鹏
    曹珍富
    林煌
    Journal of Shanghai Jiaotong University(Science), 2010, 15 (04) : 397 - 402
  • [27] A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
    Kumar, Ashwani
    Ansari, Mohd Dilshad
    Ali, Jabir
    Kumar, Kapil
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 468 - 471
  • [28] A practical and secure buyer-seller watermarking protocol
    Hu, Defa
    Li, Qiaoliang
    Journal of Digital Information Management, 2011, 9 (01): : 43 - 47
  • [29] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +
  • [30] A new buyer-seller watermarking protocol without double embedding
    Zeng P.
    Cao Z.-F.
    Lin H.
    Journal of Shanghai Jiaotong University (Science), 2010, 15 (4) : 397 - 402