![download visual watermark download visual watermark](https://i.etsystatic.com/17034536/r/il/c5008c/2215765060/il_fullxfull.2215765060_ejgx.jpg)
Inf Forensics Secur, IEEE Trans 6(1): 202-12 Rial A, Balasch J, Preneel B (2011) A privacy-preserving buyer seller watermarking protocol based on priced oblivious transfer. Rial A, Deng M, Bianchi T, Piva A, Preneel B (2010) A provably secure anonymous buyer seller watermarking protocol. J Vis Commun Image Represent 9(3):194–210 Qiao L, Nahrstedt K (1998) Watermarking schemes and protocols for protecting rightful ownership and customer’s rights.
![download visual watermark download visual watermark](https://images.sftcdn.net/images/t_app-cover-l,f_auto/p/af85c890-9b34-11e6-a4e5-00163ec9f5fa/604984389/visual-watermark-screenshot.jpg)
Springer-Verlag, Berlin, Heidelberg 1999:223–238 in Advances in Cryptology EUROCRYPT’99, ser. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. Naor N, Shamir A (1995) Visual cryptography, in: Advances in Cryptography: Eurocrypt’94. Memon ND, Wong PW (2001) A buyer-seller watermarking protocol. Liao X, Li KD, Yin JJ (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer-seller watermarking protocol. Kumar A, Tyagi V, Mohd, Dilshad, Kapil, Kumar (2011) A practical buyer seller watermarking protocol based on discrete wavelet transform. Inf Forensics Secur, IEEE Trans, 3(4):783-786 Katzenbeisser S, Lemma A, Celik MU, van der Veen M, Maas M (2008) A buyer-seller watermarking protocol based on secure embedding. Huang J, Jeng F, Chen T (2016) A new buyer-seller watermarking protocol without multiple watermarks insertion. ACM Trans Web 10(2):9įrattolillo F (2019) A multiparty watermarking protocol for cloud environments. Comput J 58(4):944–960įrattolillo F (2016) A buyer-friendly and mediated watermarking protocol for web context. Inf Forensics Secur, IEEE Trans 2(3):350–363įrattolillo F (2015) Watermarking protocols: problems, challenges and a possible solution. Inf Process Manag 58(2):102468įrattolillo F (2007) Watermarking protocol for web context. Multimed Tools Appl 72(3):2723–2740Įsposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Third International Conference on Internet and Web Applications and Services, Athens, Greece, pp 524–529Įslami Z, Kazemnasabhaji M, Mirehi N (2014) Proxy signatures and buyer seller watermarking protocols for the protection of multimedia content. IEEE Computer Society, Washington, DC, Guangzhou, China, pp 923–929ĭeng M, Preneel B (2008b) On secure and anonymous buyer seller watermarking protocol.
![download visual watermark download visual watermark](http://www.telestream.net/company/press/images/PressImage-Gameshow3.0.jpg)
In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. Morgan Kaufman, Burlington, MAĭeng M, Preneel B (2008a) Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. LNCS Springer, Berlin/Heidelberg, 265-279Ĭox I, Bloom J, Miller M (2001) Digital watermarking: principles & practice. Applied Cryptography and Network Security 2846. Pattern Recogn 39(8):1530–1541Ĭhoi J, Sakurai k, Ji-Hwan P (2003) Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. Comput Secur 29(2):269–277Ĭhen T, Tsai D (2006) Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol. Inf Forensics Secur, IEEE Trans 9(10):1557–1568Ĭhang CC, Tsai HC, Hsieh YP (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Through the security analysis, it can be found that the proposed scheme can solve the problems reported in the existing literatures and achieves several improvements over other schemes.īianchi T, Piva A (2014) TTP-free asymmetric fingerprinting based on client side embedding. Besides, by introducing computation-cheap visual cryptography, our scheme provides a good balance between some contradictory requirements, such as security versus efficiency. As far as we know, our proposed scheme is the first watermarking protocol for tripartite transaction models. In this paper, the author proposes a TTP (Trusted Third Party) watermarking protocol based on visual cryptography for the tripartite transaction model. Classic buyer-seller watermarking protocols are designed for two-party transaction models, not fit for the data trading platform-based tripartite transaction model. Watermarking protocols designed for tracing illegal distributors when unauthorized copies are found provide good solutions for the above problem. However, when the original data buyer illegally distributes the digital data that he has bought through the data trading platform, the copyright protection problem arises. All kinds of digital data trading platforms have been established accordingly. With the development of information technology, big data has had a positive impact on the development of various industries.