Paper Title:
A Secure and Efficient Buyer-Seller Watermarking Protocol
  Abstract

A number of different buyer-seller watermarking protocols have been proposed to address preserving the rights of both the buyer and the seller. However, these existing schemes are inefficient and impractical for their high computation and bandwidth overhead. To this end, we propose a new buyer-seller watermarking protocol, where the multimedia data is encrypted using a symmetric cipher, and the public-key cipher is only used to key exchanging and data signing. Compared with the existing schemes, our scheme requires a lower computing power and communication bandwidth. In addition, some main drawbacks of those previous schemes are overcome in our scheme.

  Info
Periodical
Edited by
Shengyi Li, Yingchun Liu, Rongbo Zhu, Hongguang Li, Wensi Ding
Pages
898-902
DOI
10.4028/www.scientific.net/AMM.34-35.898
Citation
L. Y. Fu, D. F. Hu, X. L. Wang, J. L. Chen, "A Secure and Efficient Buyer-Seller Watermarking Protocol", Applied Mechanics and Materials, Vols. 34-35, pp. 898-902, 2010
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zuo Wen Tan
Abstract:Recently, Chen et al. proposed an efficient three-party encrypted key exchange protocol based upon Schnorr’s digital signature scheme with...
1367
  | Authors: De Xi Zhang, Xiao Yu Li
Chapter 3: Computational Methods for Engineering
Abstract:In this paper we provide an information delay protocol using non-orthogonal quantum states. One person can send the other person some...
178
  | Authors: Jian Quan Xie, Qing Xie, Li Jun Tian
Chapter 3: Hardware, Information Technology and System
Abstract:For protecting copyright of digital work, a kind of digital work commerce protocol is proposed based on RSA public key system. Digital...
452
  | Authors: Li Juan Zhu
Chapter 4: Network and Internet Technology, Multimedia Engineering
Abstract:Quantum key distribution protocol is a hot spot of research in the information security, so, lots of Quantum key distribution protocol...
1078
Authors: Xun Ru Yin
Chapter 10: Communication, Networks and Information Technologies
Abstract:A three-party quantum secure direct communication protocol is proposed, in which the qubit transmission forms a closed loop. In this scheme,...
857