DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol |
Seong, Teak-Young
(Interdisciplinary Program of Information Security, Pukyong National University)
Kwon, Ki-Chang (Dept. of IT Cooperative System, Gyeongbuk Provincial College) Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University) Moon, Kwang-Seok (Dept. of Electronics Engineering, Pukyong National University) Kwon, Ki-Ryong (Interdisciplinary Program of Information Security, Pukyong National University) |
1 | M.D. Swanson, M. Kobayashi, and A.H. Tewfik, "Multimedia Data Embedding and Watermarking Technologies," Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, 1998. DOI ScienceOn |
2 | C.I. Podilchuk and W. Zeng, "Image-adaptive Watermarking using Visual Models," IEEE Journal on Selected Areas Communications, Vol. 16, Issue 4, pp. 525-539, 1998. DOI ScienceOn |
3 | I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, 1997. DOI ScienceOn |
4 | Birgit Pfitzmann, "Trials of Traced Traitors," Proceeding of the First International Workshop on Information Hiding, pp. 49-64, 1996. |
5 | B. Pfitzmann and M. Schunter, "Asymmetric Fingerprinting," Advances in Cryptology, EUROCRYPT'96, LNCS 1592, pp. 150-164, 1996. |
6 | B. Pfitzmann and M. Waidner, "Anonymous Fingerprinting," Advances in Cryptology, EUROCRYPT'97, LNCS 1233, pp. 88-102, 1997. |
7 | N. Memon and P.W. Wong, "A Buyer-seller Watermarking Protocol," IEEE Transactions on Image Processing, Vol. 10, No. 4, pp. 643-649, 2001. DOI ScienceOn |
8 | C.L. Lei and M.H. Chan, "An Efficient Anonymous Buyer-Seller Watermarking Protocol," IEEE Transactions on Image Processing, Vol. 13, No. 12, pp. 1618-1626, 2004. DOI ScienceOn |
9 | M. Kuribayashi and H. Tanaka, "A Watermarking Scheme Applicable for Fingerprinting Protocol," Proceeding of International Workshop on Digital Watermarking, IWDW 2003, LNCS 2939, pp. 532-543, 2004. |
10 | K.G. Kwon, J.H. Lee, S.H. Lee, and K.R. Kwon, "POCS based Digital Watermarking in Buyer-seller Watermarking Protocol," Journal of Korea Multimedia Society, Vol. 10, No. 5, pp. 569-582, 2007. |
11 | S.H. Lee, S.G. Kwon, and K.R. Kwon, "Geometric Multiple Watermarking Scheme for Mobile 3D Content based on Anonymous Buyer-seller Watermarking Protocol," Journal of Korea Multimedia Society, Vol. 12, No. 2, pp. 244-256, 2009. 과학기술학회마을 |
12 | E.J. Goh, Encryption Schemes from Bilinear Maps, Doctor's Thesis of Stanford University of Computer Science, 2007. |
13 | M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An Efficient Buyer-Seller Watermarking Protocol based on Composite Signal Representation," Proceedings of the 11th ACM Workshop on Multimedia and Security, ACM MM&Sec., pp. 9-18, 2009. |
14 | V.V. Das and J.F. Rahman, "An Enhanced Privacy Preserving Buyer-seller Protocol for Anonymous Transaction," ACEEE International Journal on Communication, Vol. 1, No. 2, pp. 57-61, 2010. |
15 | A. Rail, J. Balasch, and B. Preneel, "A Privacy-preserving Buyer.seller Watermarking Protocol based on Priced Oblivious Transfer," IEEE Transactions On Information Forensics and Security, Vol. 6, No. 1, pp. 202-212, 2011. DOI ScienceOn |
16 | S. Wu and Q. Pu, "Comments on a Buyerseller Watermarking Protocol for Large Scale Networks," International Journal of Network Security, Vol. 14, No. 1, pp. 53-58, 2012. |
17 | Bjorn Terelius, "Towards Transferable Watermarks in Buyer-seller Watermarking Protocols," IEEE International Workshop on Information Forensics and Security, pp. 197-202, 2013. |
18 | F. Guo, Y. Mu, and W. Susilo, "Subset Membership Encryption and its Applications to Oblivious Transfer," IEEE Transactions on Information Forensics and Security, Vol. 9, No. 7, pp. 1098-1107, 2014. DOI |