By Topic

Watermarking Protocol for Web Context

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Franco Frattolillo ; Res. Centre on Software Technol., Sannio Univ., Benevento

Digital watermarking is considered to be a main technology for the copyright protection of multimedia digital content distributed on the Internet. However, watermarking procedures can effectively support copyright protection processes only if they are applied by employing specific watermarking protocols, which define the scheme of the interactions that have to take place among the entities involved in the content protection and web-based distribution. To this end, a number of current watermarking protocols can attain important achievements, such as the correct authentication of buyers without exposing their identities during web transactions and the capability of resorting to trusted watermark certification authorities to ensure a copyright protection process that is able to correctly take into account the rights of both buyers and sellers. However, these protocols are often not suitable for web context, where buyers are usually neither provided with digital certificates issued by trusted certification authorities nor able to autonomously perform complex security actions to purchase digital content distributed by web-based content providers. This paper presents an improved version of a web-oriented and interactive anonymous buyer-seller watermarking protocol previously presented by the author. The protocol overcomes the drawbacks affecting relevant protocols existing in literature, and is based on a design approach that makes it suitable for web contexts.

Published in:

IEEE Transactions on Information Forensics and Security  (Volume:2 ,  Issue: 3 )