scholarly journals DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

2014 ◽  
Vol 17 (12) ◽  
pp. 1402-1411 ◽  
Author(s):  
Teak-Young Seong ◽  
Ki-Chang Kwon ◽  
Suk-Hwan Lee ◽  
Kwang-Seok Moon ◽  
Ki-Ryong Kwon
Author(s):  
Bin Zhao ◽  
Lanjun Dang ◽  
Weidong Kou ◽  
Jun Zhang ◽  
Zan Li ◽  
...  

Author(s):  
DER-CHYUAN LOU ◽  
JIEH-MING SHIEH ◽  
HAO-KUAN TSO

In a buyer–seller watermarking protocol, a seller should embed a buyer's fingerprinting and seller's watermark into the work before the sale of a work to a buyer. If the work is violated, the fingerprinting and watermark can be extracted to correctly identify who holds the legal copyright of the work and trace the illegal reseller. In this paper, we propose a robust buyer–seller watermarking scheme based on discrete wavelet transformation (DWT) which embeds the buyer's fingerprinting and seller's watermark into an image. Besides, during the extraction phase, the extraction of the fingerprinting and watermark does not require the original image for more feasibility in real application. The proposed scheme has the following advantages. Firstly, the extraction of the fingerprinting and watermark does not require the original image. Secondly, the watermarked image maintains a good visual quality after the fingerprinting and watermark embedding. Thirdly, the proposed scheme is robust against several image processing attacks.


2010 ◽  
Vol 180 (23) ◽  
pp. 4672-4684 ◽  
Author(s):  
Bin Zhao ◽  
Weidong Kou ◽  
Hui Li ◽  
Lanjun Dang ◽  
Jun Zhang

2018 ◽  
Vol 10 (4) ◽  
pp. 118-139
Author(s):  
Xiaojuan Dong ◽  
Weiming Zhang ◽  
Xianjun Hu ◽  
Keyang Liu

This article describes how cloud storage dramatically benefits people in freeing up their local storage space, while bringing the separation of the data ownership and private manipulation. Hence, it is difficult for the cloud user to make sure that the cloud storage provider (CSP) has obeyed the request of deletion to remove all corresponding data. To solve the issue technically, this article proposes an interactive cloud-user watermarking protocol (CUW) based on the homomorphic encryption. To meet security requirements, the encrypted watermark is embedded into encrypted data. Moreover, to enjoy the convenient cloud services, the uploaded data is eventually stored in the cloud server in the form of plain text. The performance of the CUW protocol is evaluated through a prototype implementation.


Sign in / Sign up

Export Citation Format

Share Document