An efficient buyer-seller watermarking protocol based on composite signal representation

M Deng, T Bianchi, A Piva, B Preneel - … of the 11th ACM Workshop on …, 2009 - dl.acm.org
Buyer-seller watermarking protocols integrate watermarking techniques with cryptography,
for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an …

A comparison of buyer-seller watermarking protocol (BSWP) based on discrete cosine transform (DCT) and discrete wavelet transform (DWT)

A Kumar, SP Ghrera, V Tyagi - Emerging ICT for Bridging the Future …, 2015 - Springer
Buyer-Seller watermarking protocol (BSWT) is used to preserve the rights for the buyer and
the seller. Frequency domain watermarking embedding that is DCT and DWT can affect the …

An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking

S Pehlivanoglu - Proceedings of the first ACM workshop on Information …, 2013 - dl.acm.org
A buyer seller watermarking protocol is intended to ensure copyright protection, privacy and
security for both the buyer and seller simultaneously in an e-commerce application. A traitor …

[PDF][PDF] Design and analysis of fair content tracing protocols

GS Poh - 2009 - researchgate.net
The work in this thesis examines protocols designed to address the issues of tracing illegal
distribution of digital content in a fair manner. In digital content distribution, a client requests …

Analysis of a buyer–seller watermarking protocol for trustworthy purchasing of digital contents

RCW Phan, BM Goi, GS Poh, J Kim - Wireless Personal Communications, 2011 - Springer
In ubiquitous environments where human users get to access diverse kinds of (often
multimedia enabled) services irrespective of where they are, the issue of security is a major …

[PDF][PDF] Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation

M Deng, T Bianchi, A Piva, B Preneel - The International Workshop on … - esat.kuleuven.be
Buyer-seller watermarking protocols integrate watermarking techniques with cryptography,
for copyright protection, piracy tracing, and privacy protection. In this paper, our main …