Research on secure buyer-seller watermarking protocol
暂无分享,去创建一个
Liu Quan | Chen Zheng | Zhou Zude | Z. Zude | Liu Quan | Chen Zheng
[1] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[2] Liu Quan,et al. Researches on uniform meaningful watermark , 2002, 6th International Conference on Signal Processing, 2002..
[3] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[4] Oscar C. Au,et al. A blind watermarking technique for multiple watermarks , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[5] Robert H. Deng,et al. Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity , 2004, ACNS.
[6] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[7] Yong-Zhong He. Publicly Verifiable Zero-Knowledge Watermark Detection , 2005 .
[8] Chin-Chen Chang,et al. An enhanced buyer seller watermarking protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[9] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..
[10] I. Pitas,et al. The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.
[11] Shing-Chi Cheung,et al. A commutative encrypted protocol for the privacy protection of watermarks in digital contents , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[12] Shing-Chi Cheung,et al. Rights protection for digital contents redistribution over the Internet , 2002, Proceedings 26th Annual International Computer Software and Applications.
[13] Kouichi Sakurai,et al. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.
[14] Nasir D. Memon,et al. Protocols for Watermark Verification , 2001, IEEE Multim..
[15] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[16] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[17] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[18] Hua Wang,et al. A secure multicast protocol with copyright protection , 2002, CCRV.
[19] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.