Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A Buyer–Seller Watermarking Protocol Based on Secure Embedding

Published: 01 December 2008 Publication History

Abstract

In a forensic watermarking architecture, a buyer-seller protocol protects the watermark secrets from the buyer and prevents false infringement accusations by the seller. Existing protocols encrypt the watermark and the content with a homomorphic public-key cipher and perform embedding under encryption. When used for multimedia data, these protocols create a large computation and bandwidth overhead. In this correspondence, we show that the same functionality can be achieved efficiently using recently proposed secure watermark embedding algorithms.

Cited By

View all
  • (2023)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into BlockchainIEEE Transactions on Network and Service Management10.1109/TNSM.2023.323768520:3(2869-2885)Online publication date: 1-Sep-2023
  • (2022)Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic EncryptionProceedings of the 2022 International Conference on Computer, Control, Informatics and Its Applications10.1145/3575882.3575942(311-315)Online publication date: 22-Nov-2022
  • (2022)A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preservingMultimedia Tools and Applications10.1007/s11042-022-12550-781:15(21417-21448)Online publication date: 1-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 3, Issue 4
December 2008
224 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2008

Author Tags

  1. Buyer–seller protocol
  2. secure watermark embedding
  3. watermarking

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into BlockchainIEEE Transactions on Network and Service Management10.1109/TNSM.2023.323768520:3(2869-2885)Online publication date: 1-Sep-2023
  • (2022)Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic EncryptionProceedings of the 2022 International Conference on Computer, Control, Informatics and Its Applications10.1145/3575882.3575942(311-315)Online publication date: 22-Nov-2022
  • (2022)A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preservingMultimedia Tools and Applications10.1007/s11042-022-12550-781:15(21417-21448)Online publication date: 1-Jun-2022
  • (2018)A new perceptual video fingerprinting systemMultimedia Tools and Applications10.1007/s11042-017-4595-z77:6(6713-6751)Online publication date: 1-Mar-2018
  • (2018)Watermarking protocolsInternational Journal of Information Security10.1007/s10207-017-0386-917:5(587-601)Online publication date: 1-Oct-2018
  • (2017)A new buyer-seller watermarking protocol without multiple watermarks insertionMultimedia Tools and Applications10.1007/s11042-016-3573-176:7(9667-9679)Online publication date: 1-Apr-2017
  • (2016)A Buyer-Friendly and Mediated Watermarking Protocol for Web ContextACM Transactions on the Web10.1145/285603610:2(1-28)Online publication date: 29-Apr-2016
  • (2016)A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud ComputingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.259094411:11(2594-2608)Online publication date: 1-Nov-2016
  • (2016)Buyer seller watermarking protocols issues and challenges A surveyJournal of Network and Computer Applications10.1016/j.jnca.2016.08.02675:C(317-334)Online publication date: 1-Nov-2016
  • (2016)A multi-watermarking protocol for health information managementMultimedia Tools and Applications10.1007/s11042-015-2728-975:14(8123-8135)Online publication date: 1-Jul-2016
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media