119
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

A Verifiable and Secret Buyer–Seller Watermarking Protocol

, , &

REFERENCES

  • R. L. Rivest, L. Adleman, and M. L. Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, Vol. 4, no. 11, pp. 169–80, Oct. 1978.
  • C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan, “An efficient and anonymous buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, Vol. 13, no. 12, pp. 1618–26, Dec. 2004.
  • C. C. Chang, and C. Y. Chung, “An enhanced buyer seller watermarking protocol,” International Conference on Communication Technology Proceedings, Vol. 2, pp. 1779–83, Apr. 2003.
  • M. Deng, and B. Preneel, “On secure and anonymous buyer-seller watermarking protocol,” The Third International Conference on Internet and Web Applications and Services, pp.524–29, Jun. 2008.
  • C. I. Fan, M. T. Chen, and W. Z. Sun, “Buyer-seller watermarking protocols with off-line trusted parties,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 4, no. 1, pp. 36–43, Jan. 2009.
  • I. M. Ibrahim, S. H. N. El-Din, and A. F. A. Hegazy, “An effective and secure buyer-seller watermarking protocol,” Third International Symposium on Information Assurance and Security (IAS 2007), pp. 21–8, Aug. 2007.
  • M. Kuribayashi, and H. Tanaka, “Fingerprinting protocol for on-line trade using information gap between buyer and merchant,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89–A, no. 4, pp. 1108–15, Apr. 2006.
  • N. D. Memon, and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, Vol. 10, pp. 643–49, Apr. 2001.
  • L. Qian, and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightful ownerships and customer's rights,” Journal of Visual Communication and Image Representation 3, Vol. 9, no. 3, pp. 194–210, Sep. 1998.
  • A. Rial, J. Balasch, and B. Preneel, “A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer,” IEEE Transactions on Information Forensics and Security, Vol. 6, no. 1, pp. 202–12, Mar. 2011.
  • A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, “A provably secure anonymous buyer-seller watermarking protocol,” IEEE Transactions on Information Forensics and Security, Vol. 5, no. 4, pp. 920–31, Dec. 2010.
  • L. Liu, T. Guan, and Z. Zhang, “Broadcast monitoring protocol based on secure watermark embedding,” Computers & Electrical Engineering, Vol. 39, no. 7, pp. 2299–305, Oct. 2013.
  • T. Bianchi, and A. Piva, “TTP-free asymmetric fingerprinting based on client side embedding,” IEEE Transactions on Information Forensics and Security, Vol. 9, no. 10, pp. 1557–68, Oct. 2014.
  • X. B. Wen, H. Zhang, X. Q. Xu, and J. J. Quan, “A new watermarking approach based on probabilistic neural network in wavelet domain,” Soft Computing, Vol. 13, no. 4, pp. 355–60, Feb. 2009.
  • M. Botta, D. Cavagnino, and V. Pomponiu,(2014, Jul.) “Fragile watermarking using Karhunen–Loève transform: the KLT-F approach,” Soft Computing, In press, Available::, http://dx.doi.org/10.1007/s00500-014-1373-y
  • P. Albano, A. Bruno, B. Carpentieri, A. Castiglione, A. Castiglione, F. Palmieri, R. Pizzolante, K. Yim, and I. You, “Secure and distributed video surveillance via portable devices,” Journal of Ambient Intelligence and Humanized Computing, Vol. 5, no. 2, pp. 205–13, Apr. 2014.
  • J. Zhang, W. Kou, and K. Fan, “Secure buyer-seller watermarking protocol,” IEEE Proceedings, Vol. 153, no. 1, pp. 15–18, Mar. 2006.
  • R. S. Zuberi, B. Lall, and S. N. Ahmad, “Privacy protection through k-anonymity in location based services,” IETE Technical Review, Vol. 29, no. 3, pp. 196–201, May. 2012.
  • X. Wang, T. Liu, and G. Xiao, “Certificate based anonymous authentication protocol for vehicular Ad Hoc network,” IETE Technical Review, Vol. 29, no. 5, pp. 388–93, Sep. 2012.
  • I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, Vol. 6, no. 12, pp. 1673–87, Dec. 1997.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.