• Xiao X, Zhang Y, Zhu Y, Hu P and Cao X. (2023). FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. IEEE Transactions on Network and Service Management. 20:3. (2869-2885). Online publication date: 1-Sep-2023.

    https://doi.org/10.1109/TNSM.2023.3237685

  • Basuki A, Setiawan I, Rosiyadi D, Ramdhani T and Susanto H. Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic Encryption. Proceedings of the 2022 International Conference on Computer, Control, Informatics and Its Applications. (311-315).

    https://doi.org/10.1145/3575882.3575942

  • Kumar A. (2022). A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. Multimedia Tools and Applications. 81:15. (21417-21448). Online publication date: 1-Jun-2022.

    https://doi.org/10.1007/s11042-022-12550-7

  • Frattolillo F. (2018). Watermarking protocols. International Journal of Information Security. 17:5. (587-601). Online publication date: 1-Oct-2018.

    https://doi.org/10.1007/s10207-017-0386-9

  • Ghouti L. (2018). A new perceptual video fingerprinting system. Multimedia Tools and Applications. 77:6. (6713-6751). Online publication date: 1-Mar-2018.

    https://doi.org/10.1007/s11042-017-4595-z

  • Huang J, Jeng F and Chen T. (2017). A new buyer-seller watermarking protocol without multiple watermarks insertion. Multimedia Tools and Applications. 76:7. (9667-9679). Online publication date: 1-Apr-2017.

    https://doi.org/10.1007/s11042-016-3573-1

  • Xia Z, Wang X, Zhang L, Qin Z, Sun X and Ren K. (2016). A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensics and Security. 11:11. (2594-2608). Online publication date: 1-Nov-2016.

    https://doi.org/10.1109/TIFS.2016.2590944

  • Khan A, Jabeen F, Naz F, Suhail S, Ahmed M and Nawaz S. (2016). Buyer seller watermarking protocols issues and challenges A survey. Journal of Network and Computer Applications. 75:C. (317-334). Online publication date: 1-Nov-2016.

    https://doi.org/10.1016/j.jnca.2016.08.026

  • Jeng F, Wu Y and Chen T. (2016). A multi-watermarking protocol for health information management. Multimedia Tools and Applications. 75:14. (8123-8135). Online publication date: 1-Jul-2016.

    https://doi.org/10.1007/s11042-015-2728-9

  • Frattolillo F. (2016). A Buyer-Friendly and Mediated Watermarking Protocol for Web Context. ACM Transactions on the Web. 10:2. (1-28). Online publication date: 25-May-2016.

    https://doi.org/10.1145/2856036

  • Eslami Z, Kazemnasabhaji M and Mirehi N. (2014). Proxy signatures and buyer---seller watermarking protocols for the protection of multimedia content. Multimedia Tools and Applications. 72:3. (2723-2740). Online publication date: 1-Oct-2014.

    https://doi.org/10.1007/s11042-013-1555-0

  • Subramanyam A and Emmanuel S. (2014). Partially compressed-encrypted domain robust JPEG image watermarking. Multimedia Tools and Applications. 71:3. (1311-1331). Online publication date: 1-Aug-2014.

    https://doi.org/10.1007/s11042-012-1272-0

  • Megías D and Domingo-Ferrer J. (2014). Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimedia Systems. 20:2. (105-125). Online publication date: 1-Mar-2014.

    https://doi.org/10.1007/s00530-013-0307-3

  • Domingo-Ferrer J and MegíAs D. (2013). Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Computer Communications. 36:5. (542-550). Online publication date: 1-Mar-2013.

    https://doi.org/10.1016/j.comcom.2012.12.005

  • Poh G and Z'aba M. On the security and practicality of a buyer seller watermarking protocol for DRM. Proceedings of the 4th international conference on Security of information and networks. (251-254).

    https://doi.org/10.1145/2070425.2070471

  • Rial A, Deng M, Bianchi T, Piva A and Preneel B. (2010). A provably secure anonymous buyer-seller watermarking protocol. IEEE Transactions on Information Forensics and Security. 5:4. (920-931). Online publication date: 1-Dec-2010.

    https://doi.org/10.1109/TIFS.2010.2072830

  • Piva A, Bianchi T and De Rosa A. (2010). Secure client-side ST-DM watermark embedding. IEEE Transactions on Information Forensics and Security. 5:1. (13-26). Online publication date: 1-Mar-2010.

    https://doi.org/10.1109/TIFS.2009.2038761

  • Thomas T, Emmanuel S, Subramanyam A and Kankanhalli M. (2009). Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security. 4:4. (758-767). Online publication date: 1-Dec-2009.

    https://doi.org/10.1109/TIFS.2009.2033229

  • Deng M, Bianchi T, Piva A and Preneel B. An efficient buyer-seller watermarking protocol based on composite signal representation. Proceedings of the 11th ACM workshop on Multimedia and security. (9-18).

    https://doi.org/10.1145/1597817.1597820