Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.
Mina DengBart PreneelPublished in: ISECS (2008)
Keyphrases
- trusted third party
- third party
- electronic commerce
- watermarking scheme
- watermarking technique
- ring signature scheme
- digital signature
- watermarking algorithm
- security protocols
- digital watermarking
- transaction costs
- watermarking method
- image watermarking
- digital image watermarking
- digital images
- security properties
- cryptographic protocols
- credit card
- data publishing
- geometric attacks
- blind watermarking
- watermark embedding
- copyright protection
- watermark detection
- digital watermark
- privacy protection
- payment protocol
- key distribution
- spread spectrum
- jpeg compression
- data hiding
- designated verifier
- seller agents
- signal processing
- supply chain