Filters








147 Hits in 4.6 sec

Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights

Lintian Qiao, Klara Nahrstedt
1998 Journal of Visual Communication and Image Representation  
and in the area of security the rightful ownership and are successful against the protocols and authentication schemes.  ...  The waand protection of the customer's rights problem.  ...  CUSTOMER'S RIGHTS PROTECTION PROTOCOLS prove his innocence. Would C be able to use V W c publicly and at the same time prevent others' illegal use?  ... 
doi:10.1006/jvci.1998.0391 fatcat:lc5rhrdpjzfidbohoseisofnsi

Buyer seller watermarking protocol for digital rights management

Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur
2009 Proceedings of the 2nd international conference on Security of information and networks - SIN '09  
Watermarks were introduced as a means to establish ownership of digital data and check unauthorized reuse of copyrighted material.  ...  Proposed system addresses problems of customer's check, copy detection, customers right, unbinding, non-repudiation and man in the middle attack.  ...  Watermark generation and insertion by CA addresses Customer's check problem, unbinding problem and Customer's right problem.  ... 
doi:10.1145/1626195.1626266 dblp:conf/sin/LaxmiKKG09 fatcat:vn6ogxikdvantgh5jywvfsnssu

An Efficient and Anonymous Buyer-Seller Watermarking Protocol

C.-L. Lei, P.-L. Yu, P.-L. Tsai, M.-H. Chan
2004 IEEE Transactions on Image Processing  
In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration.  ...  The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem.  ...  Customer's Right Problem and Owner-Customer Watermarking Protocol All of the traditional watermark-based fingerprinting protocols were designed to protect the seller's ownership of digital contents rather  ... 
doi:10.1109/tip.2004.837553 pmid:15575156 fatcat:ln63773j3zhqhgg5j3nkv7g64q

An Efficient and Impartial Buyer-Seller Watermarking Protocol

Xinchun Cui, Gang Sheng, Fengyin Li, Xiaowu Liu
2015 Journal of Communications  
To solve the unbinding problem and the buyers' right problem, operations of watermark insertion and digital content selling are performed by a Trusted Third Party in the proposed scheme.  ...  Index Terms-Copyright protection, buyer-seller protocol, unbinding problem, the buyers' right problem  ...  The authors would like to extend their sincere gratitude to the anonymous reviewers for the constructive suggestions, which led to this revised version.  ... 
doi:10.12720/jcm.10.5.339-344 fatcat:c5arhrjq4rg2jamve5657ru3lu

A Verifiable and Secret Buyer–Seller Watermarking Protocol

Chin-Ling Chen, Chin-Chang Chen, De-Kui Li, Po-Yueh Chen
2014 IETE Technical Review  
In other words, the proposed protocol can trace piracy and protect the customer's rights without a TTP. Therefore, the conspiracy problem can be solved.  ...  The proposed protocol also can protect the anonymity of the buyer and bind the buyer's watermark to digital content.  ...  In 2001, Memon and Wong proposed a buyer-seller watermarking protocol [8] . Memon and Wong's protocol solved the problem of customer's right.  ... 
doi:10.1080/02564602.2014.983565 fatcat:wxwzxnmrhnehhho7zq3didc23u

A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform

Ashwani Kumar, Vipin Tyagi, Mohd Dilshad, Kapil Kumar
2011 International Journal of Computer Applications  
Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy  ...  In this we use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. The protocol has better security property and higher efficiency.  ...  A buyer-seller watermarking protocol is one that combines encryption, digital watermarking, and other techniques to ensure rights protection for both the buyer and the seller in e-commerce.  ... 
doi:10.5120/2528-3441 fatcat:glqceezge5d3bpcdc7c6dqivve

An Enhanced Watermarking Protocol for Electronic Copyright Management

Jun Zhang, Weidong Kou, Kai Fan
2006 2006 First International Symposium on Pervasive Computing and Applications  
To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al s scheme by introducing document nature code (DNC) and register records table.  ...  In Piva et als watermarking scheme for Electronic Copyright Management System (ECMS), authors were considered trustedpotentially, so a dishonest author could authorize more than one distributor to sell  ...  Most of existing watermarking protocols concern the security of digital document transaction between a distributor and a customer, e.g., customer's right problem [7] [8] [9] , private protection [10]  ... 
doi:10.1109/spca.2006.297449 fatcat:mq6vlmmgwnhjbkxwiz7witoajm

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

Teak-Young Seong, Ki-Chang Kwon, Suk-Hwan Lee, Kwang-Seok Moon, Ki-Ryong Kwon
2014 Journal of Korea Multimedia Society  
In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol  ...  This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce.  ...  So this scheme can overcome piracy tracing, customer's right, and unbinding problems.  ... 
doi:10.9717/kmms.2014.17.12.1402 fatcat:kmhtramkmjcbzemcwgulsezxxi

A SECURE WEB BASED WATERMARKING SCHEME

Nidal F. Shilbayeh*, Sameer A. Nooh
2020 Zenodo  
The proposed watermarking protocol solve the collude problem for the trusted certificate authority (CA) and applies the idea of the zero knowledge proof for verification purposes.  ...  Several schemes have been developed for copyright protection of the web based digital contents distributed over the internet.  ...  In Craver, Memon, Yeo, and Yeung [17] present solutions to the resolution of the rightful ownership problem and protection of the customer's rights problem. Jeffrey A. Bloom et al.  ... 
doi:10.5281/zenodo.3632554 fatcat:d7mlcmnqpbgu3nu4qk4jufrtea

Image Watermarking with Biometric Data for Copyright Protection

Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger
2015 2015 10th International Conference on Availability, Reliability and Security  
The proposed scheme based on the combination of the watermarking and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer.  ...  We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content.  ...  Proposed method The proposed method has for objective to protect at the same time the ownership of an image and the right of use for a customer.  ... 
doi:10.1109/ares.2015.100 dblp:conf/IEEEares/BarbierBR15 fatcat:3rdiaxjyjbc4jdr6iyf5m22rle

Image Watermaking With Biometric Data For Copyright Protection [article]

Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger
2015 arXiv   pre-print
The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer.  ...  We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content.  ...  Proposed method The proposed method has for objective to protect at the same time the ownership of an image and the right of use for a customer.  ... 
arXiv:1503.04624v1 fatcat:5s6g6ktgvjcfzepsy3eflyadh4

A Secure and Practical Buyer-Seller Watermarking Protocol

Defa Hu, Qiaoliang Li
2009 2009 International Conference on Multimedia Information Networking and Security  
Digital watermarking is an emerging technology for combating copyright piracy.  ...  In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while  ...  Related works Qian and Nahrstedt [4] first proposed a watermarking protocol to solve the customer's rights problem.  ... 
doi:10.1109/mines.2009.132 fatcat:revxago4vngbdh3334wqx36h3m

On Secure and Anonymous Buyer-Seller Watermarking Protocol

Mina Deng, Bart Preneel
2008 2008 Third International Conference on Internet and Web Applications and Services  
Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after  ...  In this paper, we analyze the security of some previously proposed schemes, and propose an secure and anonymous buyer-seller watermarking protocol.  ...  A buyer-seller watermarking protocol [8] , [9] , [10] is one that combines encryption, digital watermarking, and other techniques to ensure rights protection for both the buyer and the seller in e-commerce  ... 
doi:10.1109/iciw.2008.28 dblp:conf/iciw/DengP08 fatcat:gbd2zuxnc5cidoa6dmdh6chehq

A Secure and Efficient Buyer-Seller Watermarking Protocol

Yuping Hu, Jun Zhang
2009 Journal of Multimedia  
In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of watermarks for a buyer simultaneously  ...  The analyses indicate that the proposed protocol is secure and practical. Index Terms-copyright protection,digital watermarking, secure protocol Yuping Hu: Male, born in 1969, he received his B.  ...  In spite of solving the customer's right problem, Memon and Wong's protocol has several issues.  ... 
doi:10.4304/jmm.4.3.161-168 fatcat:x5ljzpdukvhsdl46ubtli36dmq

A High Security Buyer-Seller Watermark Protocol based on Iris Biometric

Chunlin Song, Jie Sang, Bo Zhou
2016 Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)  
However, the copyright protection is fully protected by watermark technology if it is employed a suitable protocol between the rights owner and the customer.  ...  Abstract: With the development of digital watermarking technology, digital watermarking protocol is now drawing the attention for protecting copyrights of digital products.  ...  However, the other researchers pointed out this scheme could not solve customer's right problem because the watermarked copy can still be accessed in its final form.  ... 
doi:10.2174/2213111607666160502121043 fatcat:ajvbgcsbt5cqlnfxzabgx5z4k4
« Previous Showing results 1 — 15 out of 147 results