An enhanced buyer seller watermarking protocol

CC Chang, CY Chung - International Conference on …, 2003 - ieeexplore.ieee.org
Digital watermarks are helpful about the possession identification as well as copyright and
intellectual property protection for tons and tons of multimedia data transmitted through the …

A secure and practical buyer-seller watermarking protocol

D Hu, Q Li - … on Multimedia Information Networking and Security, 2009 - ieeexplore.ieee.org
A buyer-seller watermarking protocol can enable a seller to successfully identify a traitor
from a pirated copy, while preventing the seller from framing an innocent buyer. To this end …

An efficient and anonymous buyer-seller watermarking protocol

CL Lei, PL Yu, PL Tsai, MH Chan - IEEE transactions on Image …, 2004 - ieeexplore.ieee.org
For the purpose of deterring unauthorized duplication and distribution of multimedia
contents, a seller may insert a unique digital watermark into each copy of the multimedia …

A buyer-seller watermarking protocol

N Memon, PW Wong - IEEE Transactions on image processing, 2001 - ieeexplore.ieee.org
Digital watermarks have previously been proposed for the purposes of copy protection and
copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts …

A privacy-preserving buyer-seller watermarking protocol with semi-trust third party

MH Shao - Trust, Privacy and Security in Digital Business: 4th …, 2007 - Springer
Digital watermarking is a value-added technique used in digital rights management systems
for the purposes of copy protection and copy deterrence for digital contents, and it has …

Buyer-seller watermarking protocol for an anonymous network transaction

VV Das - 2008 First International Conference on Emerging …, 2008 - ieeexplore.ieee.org
Digital watermarks are used for protecting the digital contents from unauthorized duplication
and distribution over internet. This can be achieved by inserting a unique digital watermark …

A verifiable and secret buyer–seller watermarking protocol

CL Chen, CC Chen, DK Li, PY Chen - IETE Technical Review, 2015 - Taylor & Francis
ABSTRACT A trusted third party (TTP) is introduced to the buyer–seller protocol to
guarantee the transaction fairness in protocol. However, the TTP practically increases the …

[PDF][PDF] A secure watermarking scheme for buyer-seller identification and copyright protection

F Ahmed, F Sattar, MY Siyal, D Yu - EURASIP Journal on Advances in …, 2006 - Springer
We propose a secure watermarking scheme that integrates watermarking with cryptography
for addressing some important issues in copyright protection. We address three copyright …

Secure buyer–seller watermarking protocol

J Zhang, W Kou, K Fan - IEE Proceedings-Information Security, 2006 - IET
In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee
that a protocol is fair to both the seller and buyer in a digital content transaction. However …

An effective and secure buyer-seller watermarking protocol

IM Ibrahim, SHN El-Din… - … Symposium on Information …, 2007 - ieeexplore.ieee.org
Different buyer-seller watermarking protocols have been proposed to address preserving
the digital rights of both the buyer and the seller. The previously published protocols have …