Buyer-seller watermarking protocols with off-line trusted third parties

被引:9
作者
Fan, Chun-I [1 ]
Chen, Ming-Te [1 ]
Sun, Wei-Zhe [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
anonymity; copyright; digital right management; watermarks; EFFICIENT;
D O I
10.1504/IJAHUC.2009.021912
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a buyer-seller watermarking protocol, buyers and sellers protect the ownerships or copyrights of their digital contents through the watermarks embedded in them. However, some known attacks and problems are still threatening the security of the watermarking mechanisms so far. Although several solutions have been introduced in the literature, none can cope with all problems. In this paper, we propose a novel buyer-seller watermarking protocol, with an off-line trusted third party, that can withstand the attacks and resolve the dispute between the buyers and the sellers fairly. Furthermore, our proposed protocol can guarantee the anonymity of the buyers as well.
引用
收藏
页码:36 / 43
页数:8
相关论文
共 21 条
[1]  
Adelsbach A., 2001, Proceedings of the 4th Inter. Workshop on Info. Hiding, V2137, P273
[2]   PROCESSING ENCRYPTED DATA [J].
AHITUV, N ;
LAPID, Y ;
NEUMANN, S .
COMMUNICATIONS OF THE ACM, 1987, 30 (09) :777-780
[3]  
CAPELLA M, 2005, LECT NOTES COMPUTER, V3592, P60
[4]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
[5]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[6]  
Choi JG, 2003, LECT NOTES COMPUT SC, V2846, P265
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]  
Ellison C., 1999, 2692 RFC
[9]  
ER HF, 1998, EE381K MULTIDIMENSIO, P1
[10]  
Fan CI, 2001, INT J ELECTRON COMM, V6, P93