8 June 2012 Dual watermarking scheme for secure buyer-seller watermarking protocol
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 83342U (2012); doi: 10.1117/12.956459
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Neelesh Mehra, Madhu Shandilya, "Dual watermarking scheme for secure buyer-seller watermarking protocol", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342U (8 June 2012); doi: 10.1117/12.956459; https://doi.org/10.1117/12.956459
PROCEEDINGS
5 PAGES


SHARE
KEYWORDS
Digital watermarking

Targeting Task Performance metric

Cryptography

Multimedia

Astatine

Databases

Electronics

RELATED CONTENT

Data hiding technique in JPEG compressed domain
Proceedings of SPIE (August 01 2001)
Thousands of on-line observers is just the beginning
Proceedings of SPIE (February 10 2009)
Sensitivity analysis of Euclidean minimum spanning tree
Proceedings of SPIE (February 04 2010)
Data hiding in halftone images with parity coding
Proceedings of SPIE (August 01 2001)
Human perception of geometric distortions in images
Proceedings of SPIE (June 22 2004)

Back to Top