메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages 920-931

A provably secure anonymous buyer-seller watermarking protocol

Author keywords

Buyer seller watermarking (BSW) protocol; ideal world real world paradigm

Indexed keywords

BUYER-SELLER WATERMARKING; COPYRIGHT PROTECTIONS; DIGITAL CONTENTS; FORMAL ANALYSIS; FORMAL SECURITY; IDEAL-WORLD/REAL-WORLD PARADIGM; ITS EFFICIENCIES; PROVABLY SECURE; SECURITY PROPERTIES;

EID: 78649400346     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2072830     Document Type: Article
Times cited : (55)

References (38)
  • 3
    • 0029394108 scopus 로고
    • Electronic marking and identification techniques to discourage document copying
    • Oct
    • J. Brassil, S. H. Low, N. F. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying", IEEE J. Sel. Areas Commun., vol. 13, no. 8, pp. 1495-1504, Oct. 1995.
    • (1995) IEEE J. Sel. Areas Commun. , vol.13 , Issue.8 , pp. 1495-1504
    • Brassil, J.1    Low, S.H.2    Maxemchuk, N.F.3    O'Gorman, L.4
  • 4
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data", LNCS, vol. 963, pp. 452-465, 1995.
    • (1995) LNCS , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 5
    • 20444373301 scopus 로고    scopus 로고
    • Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
    • Jun
    • Z. J. Wang, M. Wu, H. V. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation", IEEE Trans. Image Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
    • (2005) IEEE Trans. Image Process. , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.J.1    Wu, M.2    Zhao, H.V.3    Trappe, W.4    Liu, K.J.R.5
  • 6
    • 0038527384 scopus 로고    scopus 로고
    • Anti-collusion fingerprinting for multimedia
    • Apr
    • W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia", IEEE Trans. Image Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
    • (2003) IEEE Trans. Image Process. , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 8
    • 0010902349 scopus 로고
    • The protection of computer software: Its technology and applications
    • Cambridge, U. K.: Cambridge Univ. Press
    • D. Grover, "The protection of computer software: Its technology and applications", in The British Computer Society Monographs in Informatics. Cambridge, U. K.: Cambridge Univ. Press, 1992.
    • (1992) The British Computer Society Monographs in Informatics
    • Grover, D.1
  • 9
    • 84947942283 scopus 로고
    • Fingerprinting long forgiving messages
    • ser. Lecture Notes in Computer Science, H. C. Williams, Ed. New York: Springer
    • G. R. Blakley, C. Meadows, and G. B. Purdy, "Fingerprinting long forgiving messages", in CRYPTO, ser. Lecture Notes in Computer Science, H. C. Williams, Ed. New York: Springer, 1985, vol. 218, pp. 180-189.
    • (1985) CRYPTO , vol.218 , pp. 180-189
    • Blakley, G.R.1    Meadows, C.2    Purdy, G.B.3
  • 10
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data (extended abstract)
    • ser. Lecture Notes in Computer Science, D. Coppersmith, Ed. New York: Springer
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data (extended abstract)", in CRYPTO, ser. Lecture Notes in Computer Science, D. Coppersmith, Ed. New York: Springer, 1995, vol. 963, pp. 452-465.
    • (1995) CRYPTO , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 11
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking schemes and protocols for protecting rightful ownership and customer's rights
    • Sep
    • L. Qian and K. Nahrstedt, "Watermarking schemes and protocols for protecting rightful ownership and customer's rights", J. Vis. Commun. Image Represent., vol. 9, no. 3, pp. 194-210, Sep. 1998.
    • (1998) J. Vis. Commun. Image Represent. , vol.9 , Issue.3 , pp. 194-210
    • Qian, L.1    Nahrstedt, K.2
  • 14
    • 0002221784 scopus 로고    scopus 로고
    • Protocols for collusion-secure asymmetric fingerprinting
    • I. Biehl and B. Meyer, "Protocols for collusion-secure asymmetric fingerprinting", in Proc. 14th STACS LNCS 1200, 1997, pp. 213-222.
    • (1997) Proc. 14th STACS LNCS 1200 , pp. 213-222
    • Biehl, I.1    Meyer, B.2
  • 15
    • 84947903916 scopus 로고    scopus 로고
    • Proving ownership of digital content
    • ser. Lecture Notes in Computer Science, A. Pfitzmann, Ed. New York: Springer
    • A. Adelsbach, B. Pfitzmann, and A.-R. Sadeghi, "Proving ownership of digital content", in Information Hiding, ser. Lecture Notes in Computer Science, A. Pfitzmann, Ed. New York: Springer, 1999, vol. 1768, pp. 117-133.
    • (1999) Information Hiding , vol.1768 , pp. 117-133
    • Adelsbach, A.1    Pfitzmann, B.2    Sadeghi, A.-R.3
  • 16
    • 84937405827 scopus 로고    scopus 로고
    • Anonymous fingerprinting with direct non-repudiation
    • ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer
    • B. Pfitzmann and A.-R. Sadeghi, "Anonymous fingerprinting with direct non-repudiation", in ASIACRYPT, ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer, 2000, vol. 1976, pp. 401-414.
    • (2000) ASIACRYPT , vol.1976 , pp. 401-414
    • Pfitzmann, B.1    Sadeghi, A.-R.2
  • 17
    • 84937417240 scopus 로고    scopus 로고
    • Efficient anonymous fingerprinting with group signatures
    • ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer
    • J. Camenisch, "Efficient anonymous fingerprinting with group signatures", in ASIACRYPT, ser. Lecture Notes in Computer Science, T. Okamoto, Ed. New York: Springer, 2000, vol. 1976, pp. 415-428.
    • (2000) ASIACRYPT , vol.1976 , pp. 415-428
    • Camenisch, J.1
  • 18
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Apr
    • N. D. Memon and P. W. Wong, "A buyer-seller watermarking protocol", IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.D.1    Wong, P.W.2
  • 19
    • 35248849802 scopus 로고    scopus 로고
    • An anonymous buyerseller watermarking protocol with anonymity control
    • Nov
    • H.-S. Ju, H.-J. Kim, D.-H. Lee, and J.-I. Lim, "An anonymous buyerseller watermarking protocol with anonymity control", Inf. Security Cryptology, pp. 421-432, Nov. 2002.
    • (2002) Inf. Security Cryptology , pp. 421-432
    • Ju, H.-S.1    Kim, H.-J.2    Lee, D.-H.3    Lim, J.-I.4
  • 20
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • Dec
    • C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol", IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.12 , pp. 1618-1626
    • Lei, C.-L.1    Yu, P.-L.2    Tsai, P.-L.3    Chan, M.-H.4
  • 23
    • 70449671086 scopus 로고    scopus 로고
    • An efficient buyer-seller watermarking protocol based on composite signal representation
    • Princeton, NJ, New York, ACM
    • M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation", in Proc. 11th ACM Workshop on Multimedia and Security, Princeton, NJ, New York, 2009, pp. 9-18, ACM.
    • (2009) Proc. 11th ACM Workshop on Multimedia and Security , pp. 9-18
    • Deng, M.1    Bianchi, T.2    Piva, A.3    Preneel, B.4
  • 24
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, "Universally Composable Security: A New Paradigm for Cryptographic Protocols", in Proc. 42nd IEEE Symp. Foundations of Computer Science, 2001, pp. 136-145.
    • (2001) Proc. 42nd IEEE Symp. Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 25
    • 78649400010 scopus 로고    scopus 로고
    • Anonymous buyer-seller watermarking protocols-Part II: Efficient implementations
    • submitted for publication
    • M. Deng, T. Bianchi, A. Piva, A. Rial, and B. Preneel, "Anonymous buyer-seller watermarking protocols-Part II: Efficient implementations", IEEE Trans. Inf. Forensics Security, submitted for publication.
    • IEEE Trans. Inf. Forensics Security
    • Deng, M.1    Bianchi, T.2    Piva, A.3    Rial, A.4    Preneel, B.5
  • 26
    • 85024290278 scopus 로고
    • Group signatures
    • D. Chaum and E. van Heyst, "Group signatures", in EUROCRYPT, 1991, pp. 257-265.
    • (1991) EUROCRYPT , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 27
    • 24144477851 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • ser. Lecture Notes in Computer Science, A. Menezes, Ed. New York: Springer
    • M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups", in CT-RSA, ser. Lecture Notes in Computer Science, A. Menezes, Ed. New York: Springer, 2005, vol. 3376, pp. 136-153.
    • (2005) CT-RSA , vol.3376 , pp. 136-153
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 28
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption", J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 29
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes", in EUROCRYPT, 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 30
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • ser. Lecture Notes in Computer Science, K. Kim, Ed. New York: Springer
    • I. Damgärd and M. Jurik, "A generalisation, a simplification and some applications of paillier's probabilistic public-key system", in Public Key Cryptography, ser. Lecture Notes in Computer Science, K. Kim, Ed. New York: Springer, 2001, pp. 119-136, vol. 1992.
    • (2001) Public Key Cryptography , vol.1992 , pp. 119-136
    • Damgärd, I.1    Jurik, M.2
  • 31
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • E. F. Brickell, Ed., Springer-Verlag
    • M. Bellare and O. Goldreich, "On defining proofs of knowledge", in CRYPTO'92, E. F. Brickell, Ed., 1992, vol. 740, pp. 390-420, Springer-Verlag.
    • (1992) CRYPTO'92 , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 33
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • ser. Lecture Notes in Computer Science, D. Boneh, Ed. New York: Springer
    • J. Camenisch and V. Shoup, "Practical verifiable encryption and decryption of discrete logarithms", in CRYPTO, ser. Lecture Notes in Computer Science, D. Boneh, Ed. New York: Springer, 2003, vol. 2729, pp. 126-144.
    • (2003) CRYPTO , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 34
    • 84948969076 scopus 로고    scopus 로고
    • Fair encryption of RSA keys
    • G. Poupard and J. Stern, "Fair encryption of RSA keys", in EURO-CRYPT, 2000, pp. 172-189.
    • (2000) EURO-CRYPT , pp. 172-189
    • Poupard, G.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.