References
- N.D. Memon, P.W. Wong, "A Buyer-Seller Watermarking Protocol," IEEE Transactions on Image Processing," vol. 10, no. 4, pp. 643-649, 2001. https://doi.org/10.1109/83.913598
- L. Qian, K. Nahrstedt, "Watermarking Schemes and Protocols for Protecting Rightful Ownerships and Customer's Rights," Journal of Visual Communication and Image Representation, vol. 9, no. 3, pp. 194-210, 1998. https://doi.org/10.1006/jvci.1998.0391
- C.L. Lei, P.L. Yu, P.L. Tsai, M.H. Chan, "An Efficient and Anonymous Buyer Seller Watermarking Protocol," IEEE Transactions on Image Processing, vol. 13, no. 12, pp. 1618-1626, 2004. https://doi.org/10.1109/TIP.2004.837553
- C.C. Chang, C.Y. Chung, "An Enhanced Buyer Seller Watermarking Protocol," in Proc. of International Conference on Communication Technology, vol. 2, pp. 1779-1783, Apr. 2003.
- J. Zhang, W. Kou, K. Fan, "Secure Buyer-Seller Watermarking Protocol," IEEE Proceedings, vol. 153, pp. 15-18, 2006. https://doi.org/10.1049/ip-com:20045332
- M. Kuribayashiv, H. Tanaka, "Fingerprinting Protocol for On-line Trade using Information Gap between Buyer and Merchant," IEICE Transsactions. Fundamentals, vol. E89-A, no.4, pp. 1108-1115, 2006. https://doi.org/10.1093/ietfec/e89-a.4.1108
- C.I. Fan, M.T. Chen, W.Z. Sun, "Buyer Seller Watermarking Protocols with Off-line Trusted Parties,"International Journal of Ad Hoc and Ubiquitous Computing, vol. 4, no.1, pp. 36-43, 2009. https://doi.org/10.1504/IJAHUC.2009.021912
- I.M. Ibrahim, S.H.N. El-Din, A.F.A. Hegazy, "An Effective and Secure Buyer Seller Watermarking Protocol," in Proc. of third International Symposium on Information Assurance and Security (IAS 2007), pp. 21-26, 2007.
- M. Deng, B. Preneel, "On Secure and Anonymous Buyer Seller Watermarking Protocol," in Proc. of The Third International Conference on Internet and Web Applications and Services, pp. 524-529, 2008.
- S.C. Cheung, H. Curreem, "Rights Protection for Digital Contents Redistribution over the Internet," in Proc. of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02), Oxford, UK, pp. 105-110, 2002.
- T. H. Chen, G.B. Horng, D.S. Tsai, "An Anonymous Buyer Reseller Watermarking Protocol," Journal of the Chinese Institute of Engineers, vol. 28, no. 3, pp. 535-538, 2005. https://doi.org/10.1080/02533839.2005.9671019
- Q. Liu, Z. Chen, Z. Zhou, "Research on Secure Buyer Seller Watermarking Protocol," Journal of Systems Engineering and Electronics, vol. 19, no. 2, pp. 370-376, 2008. https://doi.org/10.1016/S1004-4132(08)60094-8
- R.L. Rivest, L. Adleman, M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, pp. 169-179, 1978.
- P. Meerwald, A. Uhl, "A Survey of Wavelet-Domain Watermarking Algorithms," in Proc. of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Content III, San Jose, CA, vol. 4314, pp. 505-516, Jan. 2001.
- I.J. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no.12, pp. 1673-1687, 1997. https://doi.org/10.1109/83.650120
Cited by
- Design and Implementation of Digital Jikin using Smartphone Application vol.18, pp.5, 2011, https://doi.org/10.7472/jksii.2017.18.5.87