A secure and practical buyer-seller watermarking protocol

被引:11
|
作者
Hu, Defa [1 ]
Li, Qiaoliang [2 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Changsha 410082, Hunan, Peoples R China
[2] Hunan Normal Univ, Coll Math & Comp Sci, Changsha, Hunan, Peoples R China
关键词
watermarking protocols; digital watermarking; copy deterrence; copyright protection;
D O I
10.1109/MINES.2009.132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A buyer-seller watermarking protocol can enable a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. To this end, many buyer-seller watermarking protocols have been proposed. In the existing watermarking protocols, one or more of the major common problems which are customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution have been solved. But most of them are infeasible and not suitable for web context. First, most of the protocols assume that the buyer has the knowledge of cryptography and watermark. However, the buyer often has no knowledge of cryptography and watermark. Second, a buyer needs to interact with different parties many times in these protocols, and then it is very inconvenient for buyer. To overcome these drawbacks, a new buyer-seller watermarking protocol is proposed.
引用
收藏
页码:105 / +
页数:2
相关论文
共 50 条
  • [41] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [42] On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
    Sen Poh, Geong
    Martin, Keith M.
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 210 - 223
  • [43] A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
    Shao, Min-Hua
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 44 - 53
  • [44] Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol
    Lee, Suk-Hwan
    Kwon, Seong-Geun
    Kwon, Ki-Ryong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (02): : 504 - 523
  • [45] Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content
    Eslami, Ziba
    Kazemnasabhaji, Mohammad
    Mirehi, Narges
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2723 - 2740
  • [46] Buyer-seller watermarking protocols with off-line trusted parties
    Fan, Chun-, I
    Chen, Ming-Te
    Sun, Wei-Zhe
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1035 - +
  • [47] Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity
    Deng, Mina
    Preneel, Bart
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 923 - +
  • [48] A New and Efficient Buyer-Seller Digital Watermarking Protocol Using Identity Based Technique for Copyright Protection
    Kumar, Ashwani
    Ghrera, S. P.
    Tyagi, Vipin
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 531 - 535
  • [49] A theory of buyer-seller networks
    Kranton, RE
    Minehart, DF
    [J]. AMERICAN ECONOMIC REVIEW, 2001, 91 (03): : 485 - 508
  • [50] ADVERTISING AND BUYER-SELLER RELATIONSHIP
    WATSON, DL
    [J]. JOURNAL OF THE MARKET RESEARCH SOCIETY, 1969, 11 (02): : 125 - 146