Bandwidth efficient buyer-seller watermarking protocol Online publication date: Sat, 30-Aug-2014
by Zhongqiu Xu; Liangju Li; Haibo Gao
International Journal of Information and Computer Security (IJICS), Vol. 5, No. 1, 2012
Abstract: Digital watermarking has been used widely for the purposes of copyright protection and copy deterrence for multimedia content. In a forensic watermarking architecture, a buyer-seller watermarking protocol can enable a seller to identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Existing schemes are inefficient in practice for their high bandwidth usage. This paper proposes a buyer-seller watermarking protocol that is efficient from the bandwidth usage point of view. First, multicast that is an efficient transport technology for one-to-many communication is exploited, which can reduce the bandwidth usage significantly. Second, symmetric encryption instead of public-key encryption is performed on the multimedia content, which also can reduce the complexity and communication cost.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com