A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
1998
Journal of Visual Communication and Image Representation
and in the area of security the rightful ownership and are successful against the protocols and authentication schemes. ...
The waand protection of the customer's rights problem. ...
CUSTOMER'S RIGHTS PROTECTION PROTOCOLS prove his innocence. Would C be able to use V W c publicly and at the same time prevent others' illegal use? ...
doi:10.1006/jvci.1998.0391
fatcat:lc5rhrdpjzfidbohoseisofnsi
Buyer seller watermarking protocol for digital rights management
2009
Proceedings of the 2nd international conference on Security of information and networks - SIN '09
Watermarks were introduced as a means to establish ownership of digital data and check unauthorized reuse of copyrighted material. ...
Proposed system addresses problems of customer's check, copy detection, customers right, unbinding, non-repudiation and man in the middle attack. ...
Watermark generation and insertion by CA addresses Customer's check problem, unbinding problem and Customer's right problem. ...
doi:10.1145/1626195.1626266
dblp:conf/sin/LaxmiKKG09
fatcat:vn6ogxikdvantgh5jywvfsnssu
An Efficient and Anonymous Buyer-Seller Watermarking Protocol
2004
IEEE Transactions on Image Processing
In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. ...
The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. ...
Customer's Right Problem and Owner-Customer Watermarking Protocol All of the traditional watermark-based fingerprinting protocols were designed to protect the seller's ownership of digital contents rather ...
doi:10.1109/tip.2004.837553
pmid:15575156
fatcat:ln63773j3zhqhgg5j3nkv7g64q
An Efficient and Impartial Buyer-Seller Watermarking Protocol
2015
Journal of Communications
To solve the unbinding problem and the buyers' right problem, operations of watermark insertion and digital content selling are performed by a Trusted Third Party in the proposed scheme. ...
Index Terms-Copyright protection, buyer-seller protocol, unbinding problem, the buyers' right problem ...
The authors would like to extend their sincere gratitude to the anonymous reviewers for the constructive suggestions, which led to this revised version. ...
doi:10.12720/jcm.10.5.339-344
fatcat:c5arhrjq4rg2jamve5657ru3lu
A Verifiable and Secret Buyer–Seller Watermarking Protocol
2014
IETE Technical Review
In other words, the proposed protocol can trace piracy and protect the customer's rights without a TTP. Therefore, the conspiracy problem can be solved. ...
The proposed protocol also can protect the anonymity of the buyer and bind the buyer's watermark to digital content. ...
In 2001, Memon and Wong proposed a buyer-seller watermarking protocol [8] . Memon and Wong's protocol solved the problem of customer's right. ...
doi:10.1080/02564602.2014.983565
fatcat:wxwzxnmrhnehhho7zq3didc23u
A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform
2011
International Journal of Computer Applications
Buyer-seller watermarking protocols based on Discrete Wavelet Transform (DWT) integrate multimedia watermarking and fingerprinting with cryptography, for copyright protection, piracy tracing, and privacy ...
In this we use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. The protocol has better security property and higher efficiency. ...
A buyer-seller watermarking protocol is one that combines encryption, digital watermarking, and other techniques to ensure rights protection for both the buyer and the seller in e-commerce. ...
doi:10.5120/2528-3441
fatcat:glqceezge5d3bpcdc7c6dqivve
An Enhanced Watermarking Protocol for Electronic Copyright Management
2006
2006 First International Symposium on Pervasive Computing and Applications
To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al s scheme by introducing document nature code (DNC) and register records table. ...
In Piva et als watermarking scheme for Electronic Copyright Management System (ECMS), authors were considered trustedpotentially, so a dishonest author could authorize more than one distributor to sell ...
Most of existing watermarking protocols concern the security of digital document transaction between a distributor and a customer, e.g., customer's right problem [7] [8] [9] , private protection [10] ...
doi:10.1109/spca.2006.297449
fatcat:mq6vlmmgwnhjbkxwiz7witoajm
DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol
2014
Journal of Korea Multimedia Society
In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol ...
This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. ...
So this scheme can overcome piracy tracing, customer's right, and unbinding problems. ...
doi:10.9717/kmms.2014.17.12.1402
fatcat:kmhtramkmjcbzemcwgulsezxxi
A SECURE WEB BASED WATERMARKING SCHEME
2020
Zenodo
The proposed watermarking protocol solve the collude problem for the trusted certificate authority (CA) and applies the idea of the zero knowledge proof for verification purposes. ...
Several schemes have been developed for copyright protection of the web based digital contents distributed over the internet. ...
In Craver, Memon, Yeo, and Yeung [17] present solutions to the resolution of the rightful ownership problem and protection of the customer's rights problem. Jeffrey A. Bloom et al. ...
doi:10.5281/zenodo.3632554
fatcat:d7mlcmnqpbgu3nu4qk4jufrtea
Image Watermarking with Biometric Data for Copyright Protection
2015
2015 10th International Conference on Availability, Reliability and Security
The proposed scheme based on the combination of the watermarking and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer. ...
We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content. ...
Proposed method The proposed method has for objective to protect at the same time the ownership of an image and the right of use for a customer. ...
doi:10.1109/ares.2015.100
dblp:conf/IEEEares/BarbierBR15
fatcat:3rdiaxjyjbc4jdr6iyf5m22rle
Image Watermaking With Biometric Data For Copyright Protection
[article]
2015
arXiv
pre-print
The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not require a trusted third party, all the exchanges are between the provider and the customer. ...
We illustrate the robustness of this method against intentional and unintentional attacks of the watermarked content. ...
Proposed method The proposed method has for objective to protect at the same time the ownership of an image and the right of use for a customer. ...
arXiv:1503.04624v1
fatcat:5s6g6ktgvjcfzepsy3eflyadh4
A Secure and Practical Buyer-Seller Watermarking Protocol
2009
2009 International Conference on Multimedia Information Networking and Security
Digital watermarking is an emerging technology for combating copyright piracy. ...
In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while ...
Related works Qian and Nahrstedt [4] first proposed a watermarking protocol to solve the customer's rights problem. ...
doi:10.1109/mines.2009.132
fatcat:revxago4vngbdh3334wqx36h3m
On Secure and Anonymous Buyer-Seller Watermarking Protocol
2008
2008 Third International Conference on Internet and Web Applications and Services
Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after ...
In this paper, we analyze the security of some previously proposed schemes, and propose an secure and anonymous buyer-seller watermarking protocol. ...
A buyer-seller watermarking protocol [8] , [9] , [10] is one that combines encryption, digital watermarking, and other techniques to ensure rights protection for both the buyer and the seller in e-commerce ...
doi:10.1109/iciw.2008.28
dblp:conf/iciw/DengP08
fatcat:gbd2zuxnc5cidoa6dmdh6chehq
A Secure and Efficient Buyer-Seller Watermarking Protocol
2009
Journal of Multimedia
In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of watermarks for a buyer simultaneously ...
The analyses indicate that the proposed protocol is secure and practical. Index Terms-copyright protection,digital watermarking, secure protocol Yuping Hu: Male, born in 1969, he received his B. ...
In spite of solving the customer's right problem, Memon and Wong's protocol has several issues. ...
doi:10.4304/jmm.4.3.161-168
fatcat:x5ljzpdukvhsdl46ubtli36dmq
A High Security Buyer-Seller Watermark Protocol based on Iris Biometric
2016
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)
However, the copyright protection is fully protected by watermark technology if it is employed a suitable protocol between the rights owner and the customer. ...
Abstract: With the development of digital watermarking technology, digital watermarking protocol is now drawing the attention for protecting copyrights of digital products. ...
However, the other researchers pointed out this scheme could not solve customer's right problem because the watermarked copy can still be accessed in its final form. ...
doi:10.2174/2213111607666160502121043
fatcat:ajvbgcsbt5cqlnfxzabgx5z4k4
« Previous
Showing results 1 — 15 out of 147 results