A practical and secure buyer-seller watermarking protocol
نویسندگان
چکیده
AbstrAct: Digital watermarking is an emerging technology for combating copyright piracy. In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an inno cent buyer. In this paper, we propose a new buyer-seller watermarking protocol. Compared to the previous works, it makes two improvements, which make it more practi cal. First, no third party is introduced and hence, the problem of the seller (or buyer) colludes with a third party to cheat the buyer (or seller) is solved. Second,a double watermark insertion is avoided, and then the final quality of the watermarked content is higher and the result of the watermark detection is more accurate.
منابع مشابه
A Secure and Efficient Buyer-Seller Watermarking Protocol
The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryle...
متن کاملAn ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection
Digital watermarking protocols are the one, which have combined fingerprinting technique with watermarking, for embedding digital signal or watermark into an original multimedia object. Buyer-seller watermarking protocol is fundamentally applied to continue the digital rights of both buyers and seller. We proposed an identity-based buyer-seller watermarking protocol that encounters various weak...
متن کاملAn Efficient and Impartial Buyer-Seller Watermarking Protocol
Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. To be efficient and fair is important to buyer-seller protocols. In this paper, an anonymous and interactive buyer-seller protocol is proposed, which is designed to be impartial and efficient. To solve the unbinding problem and the buyers’ right problem, operations of water...
متن کاملSecrecy of Steganographic Matrix Embedding Phillip
the secure embedding scheme (see Section II), it is hard to generate a watermarked version of c which has a low correlation with k 0. An estimation attack usually yields a watermarked object that still correlates well with k 0 ; a judge will reject the accusation on such an object, as it can only originate from a malicious seller (k 0 is only available to the seller). • Finally, can attempt to ...
متن کاملOn the (In)Security of Two Buyer-Seller Watermarking Protocols
A buyer-seller watermarking protocol deters dishonest buyers from illegally distributing bought content. This is achieved by giving the seller the capability to trace and identify these buyers, while also allowing the seller to prove illegal acts to a third party. At the same time, an honest buyer is prevented from being falsely accused of illegal content distribution by the seller. Many protoc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDIM
دوره 9 شماره
صفحات -
تاریخ انتشار 2011