By Topic

Security scheme research of digital products online transactions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Fengying Wang ; Inst. of Comput., Shandong Univ. of Technol., Zibo ; Caihong Li ; Zhenyou Wang ; Zhen Cheng

This paper analyses the problems that the transaction scheme of existing digital products existed. We propose a relatively perfect transaction scheme. In the scheme, combining digital watermarking and fingerprinting with digital signatures, a relatively less amount of information is embedded in a digital product , so as to reduce phenomena of descending quality, as well as issues of mutual interference, and improve efficiency Before the trade, a robust symmetric watermarking was embedded in a product sample and get a new product. Then the new product is signed. Thus online buyer may verify legitimate copyright and find timely pirated products. During the trade, after an asymmetric digital fingerprinting was embedded in the digital product, could trace pirate by the trade fingerprint, could prevent merchant from bring a false charge against the buyer, and could also have an anonymous property for the buyer.

Published in:

Automation and Logistics, 2008. ICAL 2008. IEEE International Conference on

Date of Conference:

1-3 Sept. 2008