Paper
8 June 2012 Dual watermarking scheme for secure buyer-seller watermarking protocol
Neelesh Mehra, Madhu Shandilya
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 83342U (2012) https://doi.org/10.1117/12.956459
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Neelesh Mehra and Madhu Shandilya "Dual watermarking scheme for secure buyer-seller watermarking protocol", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342U (8 June 2012); https://doi.org/10.1117/12.956459
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Targeting Task Performance metric

Cryptography

Multimedia

Astatine

Databases

Electronics

Back to Top