A fair online payment system for digital content via subliminal channel

被引:17
作者
Chen, Chin-Ling [1 ]
Liao, Jyun-Jie [2 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
关键词
Subliminal channel; Payment system; Online; Digital content; SCHEME; PROTOCOL;
D O I
10.1016/j.elerap.2010.09.001
中图分类号
F [经济];
学科分类号
02 ;
摘要
In recent years, purchase of digital content using the Internet has been increasing both in popularity and convenience. On the other hand, there are a multitude of pirated editions for digital products which have become more available and easier to attain. Therefore, proving legal ownership of digital content has become important. Many researchers have proposed various schemes to protect consumer's ownership using watermark mechanisms on secure payment systems. In our scheme, we want to achieve this same result with the concept of subliminal channels and propose an intact arbitration mechanism to solve the fairness of the transaction between both the customer and the shop. Our scheme not only protects customers' legal ownership of digital content, but also provides a fair and secure protocol. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:279 / 287
页数:9
相关论文
共 23 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
Chan CW, 2006, INT CONF E BUS ENG, P339
[3]   A traceable E-cash transfer system against blackmail via subliminal channel [J].
Chen, Chin-Ling ;
Liu, Ming-He .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2009, 8 (06) :327-333
[4]  
DENG M, 2008, 3 INT C INT WEB APPL, P524
[5]  
Fan CI, 2006, SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, P383
[6]   Buyer-seller watermarking protocols with off-line trusted third parties [J].
Fan, Chun-I ;
Chen, Ming-Te ;
Sun, Wei-Zhe .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (01) :36-43
[7]  
Franklin M.K., 1997, Proceedings of the 4th ACM Conference on Computer and Communications Security, P1
[8]  
Hou X, 2005, PROCEEDINGS OF THE 3RD ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, P39
[9]  
Huang ZJ, 2005, 19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings, P67
[10]  
IBRAHIM IM, 2007, 3 INT S INF ASS SEC, P21