2009
DOI: 10.1007/s11277-009-9876-z
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
(47 reference statements)
0
5
0
Order By: Relevance
“…On the other hand, the fingerprinting watermark insert a unique user identification into the content so that it can be used to track an illegal distributer [29]. A buyer-seller watermarking schemes [30][31][32] that incorporates both watermarking and fingerprinting mechanisms to protect the rights of both the buyer and the seller have been proposed. All of the above techniques are useful for detecting content owners or tracking illegal distributors, but do not prevent illegal distribution itself because the content copy holders can possess the same original contents in their local devices.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, the fingerprinting watermark insert a unique user identification into the content so that it can be used to track an illegal distributer [29]. A buyer-seller watermarking schemes [30][31][32] that incorporates both watermarking and fingerprinting mechanisms to protect the rights of both the buyer and the seller have been proposed. All of the above techniques are useful for detecting content owners or tracking illegal distributors, but do not prevent illegal distribution itself because the content copy holders can possess the same original contents in their local devices.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, using a trusted third party is a price worth paying if it can turn a fingerprinting scheme into a practical alternative (Martínez-Ballesté, Sebé, Domingo-Ferrer, & Soriano, 2003). A buyer-seller watermarking scheme (Phan, Goi, Poh, & Jongsung, 2011;Rial, Deng, Bianchi, Piva, & Preneel, 2010) incorporates both watermarking and fingerprinting mechanisms to protect the rights of both the content provider (merchant) and the customer (buyer). A complete and sound buyer-seller watermarking protocol is expected to solve the following requirements (Deng & Preneel, 2008):…”
Section: Buyer-seller Watermarking Protocolsmentioning
confidence: 99%
“…In their protocol, the arbitration process needs the assistance of a group manager. Recently, Phan et al presented an attack [23] on the two-party watermarking protocol [19]; that is, the buyer can remove its part of the watermark from the watermarked digital content. We will show how this attack can be avoided.…”
Section: Related Workmentioning
confidence: 99%
“…This section shows how the proposed image-retrieval watermarking protocol can achieve the design goals outlined in Section 3 by examining the security problems. It follows the approach of security analysis adopted in the research of conventional buyer-seller watermarking protocols [9][10][11][13][14][15][16][17][18][19][20][21][22][23].…”
Section: Security Analysismentioning
confidence: 99%