메뉴 건너뛰기




Volumn , Issue , 2009, Pages 9-18

An efficient buyer-seller watermarking protocol based on composite signal representation

Author keywords

E.2 data storage representations : object representation; K.4.4 computers and society : electronic commerce; Performance; Security

Indexed keywords

BUYER-SELLER WATERMARKING; COMMUNICATION BANDWIDTH; COMPLEXITY ANALYSIS; COMPUTATIONAL OVERHEADS; COPYRIGHT PROTECTION ,; DATA STORAGE REPRESENTATION; HOMOMORPHIC PUBLIC-KEY; K.4.4 [COMPUTERS AND SOCIETY]: ELECTRONIC COMMERCE; OBJECT REPRESENTATIONS; PERFORMANCE; PRIVACY PROTECTION; SIGNAL REPRESENTATIONS; WATERMARKING TECHNIQUES;

EID: 70449671086     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1597817.1597820     Document Type: Conference Paper
Times cited : (52)

References (26)
  • 1
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • Topics in Cryptology, CT-RSA 2005
    • M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: the case of dynamic groups. In Topics in Cryptology - CT-RSA 2005, LNCS 3376, pages 136-153, 2005.
    • (2005) LNCS , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 3
    • 84937417240 scopus 로고
    • Efficient anonymous fingerprinting with group signatures
    • ASIACRYPT
    • J. Camenisch. Efficient anonymous fingerprinting with group signatures. In ASIACRYPT, LNCS 1976, pages 415-428, 2000.
    • (1976) LNCS , pp. 415-428
    • Camenisch, J.1
  • 4
    • 23944501377 scopus 로고    scopus 로고
    • Group signatures: Better efficiency and new theoretical aspects
    • J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In proceedings of SCN'04, pages 120-133, 2005.
    • (2005) proceedings of SCN'04 , pp. 120-133
    • Camenisch, J.1    Groth, J.2
  • 5
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • Adv. in Cryptology, EUROCRYPT 1999
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Adv. in Cryptology - EUROCRYPT 1999, LNCS 1592, pages 106-121, 1999.
    • (1999) LNCS , vol.1592 , pp. 106-121
    • Camenisch, J.1    Michels, M.2
  • 6
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Adv. in Cryptology, CRYPTO 2003
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Adv. in Cryptology - CRYPTO 2003, LNCS 2729, pages 126-144, 2003.
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 7
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4):1423-1443, May 2001.
    • (2001) IEEE Trans. on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 8
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • July
    • I. J. Cox, M. L. Miller, and A. L. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, 87(7):1127-1141, July 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 9
    • 84957802212 scopus 로고    scopus 로고
    • Efficient zero-knowledge proofs of knowledge without intractability assumptions
    • PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography, of
    • R. Cramer, I. Damgard, and P. Mackenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In PKC 2000: 3rd International Workshop on Theory and Practice in Public Key Cryptography, volume 1751 of LNCS, pages 354-372, 2000.
    • (2000) LNCS , vol.1751 , pp. 354-372
    • Cramer, R.1    Damgard, I.2    Mackenzie, P.3
  • 10
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4):573-586, 1998.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 11
    • 84867553981 scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • 4th International Workshop on Practice and Theory in Public-Key Cryptography
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public-Key Cryptography, LNCS 1992, pages 119-136, 2001.
    • (1992) LNCS , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 13
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Adv. in Cryptology, CRYPTO 84
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Adv. in Cryptology - CRYPTO 84, LNCS 196, pages 10-18, 1985.
    • (1985) LNCS , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 15
    • 0032218232 scopus 로고    scopus 로고
    • An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
    • San Francisco, CA, Nov
    • R. Gennaro, D. Micciancio, and T. Rabin. An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products. In 5th ACM Conference on Computer and Communication Security (CCS'98), pages 67-72, San Francisco, CA, Nov. 1998.
    • (1998) 5th ACM Conference on Computer and Communication Security (CCS'98) , pp. 67-72
    • Gennaro, R.1    Micciancio, D.2    Rabin, T.3
  • 17
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Dec
    • M. Kuribayashi and H. Tanaka. Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. on Image Processing, 14(12):2129-2139, Dec. 2005.
    • (2005) IEEE Trans. on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 18
  • 19
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • N. D. Memon and P. W. Wong. A buyer-seller watermarking protocol. IEEE Trans. on Image Proc., 10(4):643-649, 2001.
    • (2001) IEEE Trans. on Image Proc , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.D.1    Wong, P.W.2
  • 20
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Adv. in Cryptology, EUROCRYPT'99
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Adv. in Cryptology - EUROCRYPT'99, LNCS 1592, pages 223-238, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 22
    • 21844445258 scopus 로고    scopus 로고
    • Rational dither modulation: A high-rate data-hiding method invariant to gain attacks
    • Oct
    • F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo. Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. on Signal Processing, 53(10):3960-3975, Oct. 2005.
    • (2005) IEEE Trans. on Signal Processing , vol.53 , Issue.10 , pp. 3960-3975
    • Perez-Gonzalez, F.1    Mosquera, C.2    Barni, M.3    Abrardo, A.4
  • 23
    • 84937405827 scopus 로고
    • Anonymous fingerprinting with direct non-repudiation
    • Adv. in Cryptology, ASIACRYPT '00
    • B. Pfitzmann and A.-R. Sadeghi. Anonymous fingerprinting with direct non-repudiation. In Adv. in Cryptology - ASIACRYPT '00, LNCS 1976, pages 401-414, 2000.
    • (1976) LNCS , pp. 401-414
    • Pfitzmann, B.1    Sadeghi, A.-R.2
  • 24
    • 84947921515 scopus 로고    scopus 로고
    • Asymmetric fingerprinting
    • Adv. in Cryptology, EUROCRYPT'96
    • B. Pittzmann and M. Schunter. Asymmetric fingerprinting. In Adv. in Cryptology - EUROCRYPT'96, LNCS 1070, pages 84-95, 1996.
    • (1996) LNCS , vol.1070 , pp. 84-95
    • Pittzmann, B.1    Schunter, M.2
  • 25
    • 84948969076 scopus 로고    scopus 로고
    • Fair encryption of RSA keys
    • Adv. in Cryptology, EUROCRYPT'00
    • G. Poupard and J. Stern. Fair encryption of RSA keys. In Adv. in Cryptology - EUROCRYPT'00, LNCS 1807, pages 172-190, 2000.
    • (2000) LNCS , vol.1807 , pp. 172-190
    • Poupard, G.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.