Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/ias.2007.39
|View full text |Cite
|
Sign up to set email alerts
|

An Effective and Secure Buyer-Seller Watermarking Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 6 publications
0
20
0
Order By: Relevance
“…Zhang et al (Zhang et al, 2006) apply the idea of (Goi et al, 2004)and ensure that the buyer's watermark is generated by the buyer, instead of a watermark certificate authority (WCA). According to our analysis, we conclude that the protocols of (Lei et al, 2004), (Shao, 2007), and (Ibrahim et al, 2007) cannot resist the conspiracy attack, where a malicious seller can collude with a third party, such that the seller can discover the buyer's watermark. 5.…”
Section: Analysis Of the Existing Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Zhang et al (Zhang et al, 2006) apply the idea of (Goi et al, 2004)and ensure that the buyer's watermark is generated by the buyer, instead of a watermark certificate authority (WCA). According to our analysis, we conclude that the protocols of (Lei et al, 2004), (Shao, 2007), and (Ibrahim et al, 2007) cannot resist the conspiracy attack, where a malicious seller can collude with a third party, such that the seller can discover the buyer's watermark. 5.…”
Section: Analysis Of the Existing Workmentioning
confidence: 99%
“…Since the first introduction of the concept, several alternative design solutions have been proposed. Due to the space limit, instead of a full security analysis, we summarize the analysis and point out the shortcomings of each previous protocols (Choi et al, 2003), (Goi et al, 2004), (Lei et al, 2004), (Zhang et al, 2006), (Shao, 2007), and (Ibrahim et al, 2007). Except that the piracy tracing problem and the customer's rights problem are solved in the early schemes, the existing solutions to the other problems are either impractical or incomplete, as depicted in Table 1.…”
Section: Analysis Of the Existing Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[14] presented a protocol that also protects the buyer's privacy. Several buyer-seller protocol variants have been constructed since then, including the protocols proposed in [1], [2], [5], [6], [8], [9], [12], [13], [15], [16], [17], [21], and subsequent analyses appear in [10], [11], [20], [24], [5,4,23].…”
Section: Buyer-seller Watermarking Protocolsmentioning
confidence: 99%