메뉴 건너뛰기




Volumn 153, Issue 1, 2006, Pages 15-18

Secure buyer-seller watermarking protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DIGITAL WATERMARKING; INFORMATION TECHNOLOGY; PROBLEM SOLVING;

EID: 33645737923     PISSN: 17470722     EISSN: 17470730     Source Type: Conference Proceeding    
DOI: 10.1049/ip-ifs:20055069     Document Type: Article
Times cited : (63)

References (9)
  • 1
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
    • Qiao, L., and Nahrstedt, K.: 'Watermarking schemes and protocols for protecting rightful ownerships and customer's rights', J. Vis. Commun. Image Represent., 1998, 9, (3), pp. 194-210
    • (1998) J. Vis. Commun. Image Represent , vol.9 , Issue.3 , pp. 194-210
    • Qiao, L.1    Nahrstedt, K.2
  • 2
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Memon, N., and Wong, P.W.: 'A buyer-seller watermarking protocol', IEEE Trans. Image Process., 2001, 10, (4), pp. 643-649
    • (2001) IEEE Trans. Image Process , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 3
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H.: 'An efficient and anonymous buyer-seller watermarking protocol', IEEE Trans. Image Process, 2004, 13, (12), pp. 1618-1626
    • (2004) IEEE Trans. Image Process , vol.13 , Issue.12 , pp. 1618-1626
    • Lei, C.-L.1    Yu, P.-L.2    Tsai, P.-L.3    Chan, M.-H.4
  • 4
    • 35248849802 scopus 로고    scopus 로고
    • An anonymous buyer-seller watermarking protocol with anonymity control
    • Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC
    • Ju, H.S., Kim, H.J., Lee, D.H., and Lim, J.I.: 'An anonymous buyer-seller watermarking protocol with anonymity control', In Lee, P.J., and Lim, C.H. (Eds): Proc. ICISC 2002, LNCS 2587, pp. 421-432
    • (2002) LNCS , vol.2587 , pp. 421-432
    • Ju, H.S.1    Kim, H.J.2    Lee, D.H.3    Lim, J.I.4
  • 5
    • 0242372124 scopus 로고    scopus 로고
    • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
    • Zhou, J., Yung, M., and Han, Y. (Eds): Proc. Applied Cryptography and Network Security
    • Choi, J.-G., Sakurai, K., and Park, J.-H.: 'Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party', In Zhou, J., Yung, M., and Han, Y. (Eds): Proc. Applied Cryptography and Network Security 2003, LNCS 2846, pp. 265-279
    • (2003) LNCS , vol.2846 , pp. 265-279
    • Choi, J.-G.1    Sakurai, K.2    Park, J.-H.3
  • 6
    • 35048873815 scopus 로고    scopus 로고
    • Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
    • Jakobsson, M., Yung, M., and Zhou, J. (Eds): Proc. Applied Cryptography and Network Security
    • Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., and Siddiqi, M.U.: 'Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity', In Jakobsson, M., Yung, M., and Zhou, J. (Eds): Proc. Applied Cryptography and Network Security 2004, LNCS 3089, pp. 369-382
    • (2004) LNCS , vol.3089 , pp. 369-382
    • Goi, B.-M.1    Phan, R.C.-W.2    Yang, Y.3    Bao, F.4    Deng, R.H.5    Siddiqi, M.U.6
  • 7
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • Proc. Eurocrypt'99
    • Paillier, P.: 'Public key cryptosystems based on composite degree residuosity classes', In Proc. Eurocrypt'99 1999, Stern, J. (Ed.): LNCS 1592, pp. 223-238
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 8
    • 0345058960 scopus 로고    scopus 로고
    • A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications
    • Laih, C.S. (Ed.): Proc. Aciacrypt
    • Bresson, E., Catalano, D., and Pointcheval, D.: 'A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications', In Laih, C.S. (Ed.): Proc. Aciacrypt, 2003, LNCS 2894, pp. 37-54
    • (2003) LNCS , vol.2894 , pp. 37-54
    • Bresson, E.1    Catalano, D.2    Pointcheval, D.3
  • 9
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Cox, I.J., Kilian, J., Leighton, T., and Shamoon, T.: 'Secure spread spectrum watermarking for multimedia', IEEE Trans. Image Process., 1997, 6, (12), pp. 1673-1687
    • (1997) IEEE Trans. Image Process , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.