Bandwidth efficient buyer-seller watermarking protocol
by Zhongqiu Xu; Liangju Li; Haibo Gao
International Journal of Information and Computer Security (IJICS), Vol. 5, No. 1, 2012

Abstract: Digital watermarking has been used widely for the purposes of copyright protection and copy deterrence for multimedia content. In a forensic watermarking architecture, a buyer-seller watermarking protocol can enable a seller to identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Existing schemes are inefficient in practice for their high bandwidth usage. This paper proposes a buyer-seller watermarking protocol that is efficient from the bandwidth usage point of view. First, multicast that is an efficient transport technology for one-to-many communication is exploited, which can reduce the bandwidth usage significantly. Second, symmetric encryption instead of public-key encryption is performed on the multimedia content, which also can reduce the complexity and communication cost.

Online publication date: Sat, 30-Aug-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com