메뉴 건너뛰기




Volumn 56, Issue 1, 2011, Pages 73-83

Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents

Author keywords

Anonymity; Buyer seller; Content protection; Digital rights protection; Secret sharing; Security systems; Transactions; Trustworthy applications; Unbinding property; Watermarking and fingerprinting protocol

Indexed keywords

ANONYMITY; BUYER-SELLER; CONTENT PROTECTION; DIGITAL RIGHTS; SECRET SHARING; TRANSACTIONS; TRUSTWORTHY APPLICATIONS; UNBINDING PROPERTY;

EID: 78650587272     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-009-9876-z     Document Type: Article
Times cited : (7)

References (25)
  • 1
    • 0242372124 scopus 로고    scopus 로고
    • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
    • J. Zhou, M. Yung, & Y. Han (Eds.) Berlin: Springer
    • Choi, J. G., Sakurai, K., & Park, J. H. (2003). Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In J. Zhou, M. Yung, & Y. Han (Eds.), Applied cryptography and network security-ACNS 2003, Lecture Notes in Computer Science (Vol. 2846, pp. 265-279). Berlin: Springer.
    • (2003) Applied Cryptography and Network Security-ACNS 2003, Lecture Notes in Computer Science , vol.2846 , pp. 265-279
    • Choi, J.G.1    Sakurai, K.2    Park, J.H.3
  • 2
    • 33646204415 scopus 로고    scopus 로고
    • Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting scheme
    • J. J. Fridrich (Ed.) Berlin: Springer
    • Choi, J. G., Park, J. H., & Kwon, K. R. (2004). Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting scheme. In J. J. Fridrich (Ed.), 6th International workshop on information hiding-IH 2004, Lecture Notes in Computer Science (Vol. 3200, pp. 253-265). Berlin: Springer.
    • (2004) 6th International Workshop on Information Hiding-IH 2004, Lecture Notes in Computer Science , vol.3200 , pp. 253-265
    • Choi, J.G.1    Park, J.H.2    Kwon, K.R.3
  • 4
    • 54049122965 scopus 로고    scopus 로고
    • Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity
    • IEEE computer society, 2008
    • Deng, M., & Preneel, B. (2008a). Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In International symposium on electronic commerce and security, ICECS 2008 (pp. 923-929). IEEE computer society.
    • (2008) International Symposium on Electronic Commerce and Security, ICECS , pp. 923-929
    • Deng, M.1    Preneel, B.2
  • 7
    • 43949083701 scopus 로고    scopus 로고
    • Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
    • 20 pp. doi: 10.1155/2007/78943
    • Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R. L., Shokrollahi, J., Neven, G., et al. (2007). Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, 78:943, 20 pp. doi: 10.1155/2007/78943.
    • (2007) EURASIP Journal on Information Security , vol.78 , pp. 943
    • Erkin, Z.1    Piva, A.2    Katzenbeisser, S.3    Lagendijk, R.L.4    Shokrollahi, J.5    Neven, G.6
  • 10
    • 33744914340 scopus 로고    scopus 로고
    • Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
    • T. Enokido, L. Yan, B. Xiao, D. Kim, Y.S. Dai, & L.T. Yang (Eds.) Berlin: Springer
    • Goi, B. M., Phan, R. C. W., & Siddiqi, M. U. (2005). Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y.S. Dai, & L.T. Yang (Eds.), Embedded and ubiquitous computing-EUC 2005, Lecture Notes in Computer Science (Vol. 3823, pp. 936-944). Berlin: Springer.
    • (2005) Embedded and Ubiquitous Computing-EUC 2005, Lecture Notes in Computer Science , vol.3823 , pp. 936-944
    • Goi, B.M.1    Phan, R.C.W.2    Siddiqi, M.U.3
  • 15
    • 33646252698 scopus 로고    scopus 로고
    • Fingerprinting protocol for online-line trade using information gap between buyer and merchant
    • 10.1093/ietfec/e89-a.4.1108
    • M. Kuribayashi H. Tanaka 2006 Fingerprinting protocol for online-line trade using information gap between buyer and merchant IEICE Transactions on Fundamentals E89-A 4 1108 1115 10.1093/ietfec/e89-a.4.1108
    • (2006) IEICE Transactions on Fundamentals , vol.89 , Issue.4 , pp. 1108-1115
    • Kuribayashi, M.1    Tanaka, H.2
  • 16
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • 10.1109/TIP.2004.837553
    • C. L. Lei P. L. Yu P. L. Tsai M. H. Chan 2004 An efficient and anonymous buyer-seller watermarking protocol IEEE Transactions on Image Processing 13 12 1618 1626 10.1109/TIP.2004.837553
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.12 , pp. 1618-1626
    • Lei, C.L.1    Yu, P.L.2    Tsai, P.L.3    Chan, M.H.4
  • 17
    • 54249120286 scopus 로고    scopus 로고
    • An anonymous watermarking scheme for content distribution protection using trusted computing
    • INSTICC Press
    • Leung, A., & Poh, G. S. (2007). An anonymous watermarking scheme for content distribution protection using trusted computing. In SECRYPT 2007-International conference on security and cryptography (pp. 319-326). INSTICC Press.
    • (2007) SECRYPT 2007-International Conference on Security and Cryptography , pp. 319-326
    • Leung, A.1    Poh, G.S.2
  • 18
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • DOI 10.1109/83.913598, PII S1057714901027300
    • N. Memon P. W. Wong 2001 A buyer-seller watermarking protocol IEEE Transactions on Image Processing 10 4 643 649 1061.68531 10.1109/83.913598 (Pubitemid 32371598)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • J. Stern (Ed.) Berlin: Springer
    • Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In J. Stern (Ed.), Advances in cryptology-EUROCRYPT 1999, Lecture Notes in Computer Science (Vol. 1592, pp. 223-238). Berlin: Springer.
    • (1999) Advances in Cryptology-EUROCRYPT 1999, Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 22
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking schemes and protocols for protecting rightful ownerships and customer's rights
    • 10.1006/jvci.1998.0391
    • L. Qiao K. Nahrstedt 1998 Watermarking schemes and protocols for protecting rightful ownerships and customer's rights Journal of Visual Communication and Image Representation 9 3 194 210 10.1006/jvci.1998.0391
    • (1998) Journal of Visual Communication and Image Representation , vol.9 , Issue.3 , pp. 194-210
    • Qiao, L.1    Nahrstedt, K.2
  • 24
    • 38549127334 scopus 로고    scopus 로고
    • Security flaws in Kuribayashi-Tanaka fingerprinting protocol
    • IEEE
    • Wu, Y. (2007). Security flaws in Kuribayashi-Tanaka fingerprinting protocol. In International conference on communications, ICC 2007 (pp. 1317-1322) IEEE.
    • (2007) International Conference on Communications, ICC 2007 , pp. 1317-1322
    • Wu, Y.1
  • 25
    • 33645737923 scopus 로고    scopus 로고
    • Secure buyer-seller watermarking protocol
    • 10.1049/ip-ifs:20055069
    • J. Zhang W. Kou K. Fan 2006 Secure buyer-seller watermarking protocol IEE Proceedings-Information Security 153 1 15 18 10.1049/ip-ifs:20055069
    • (2006) IEE Proceedings-Information Security , vol.153 , Issue.1 , pp. 15-18
    • Zhang, J.1    Kou, W.2    Fan, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.