최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 시스템 및 이론, v.36 no.5, 2009년, pp.396 - 403
An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order t...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Proessing, vol.6, pp.1673-1687, Dec.1997.
M. Swanson, M. Kobayashi, and A. Tewfik, "Multimedia data embedding and watermarking technologies," Proc. IEEE, vol.86, pp.1064-1087, June 1998.
N. R. Wanger, "Fingerprinting," IEEE Symposium on Seurity and Privacy, pp.18-22, 1983.
B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting," Eurocrypt'96, LNCS 1070, pp.84-95, Springer-Verlag, 1996.
L. Qian and K. Nahresedt, "Watermarking schemes and protocols for protecting rightful ownership and customer's rights," J. Vis. Commun. Image Representation, vol.9, pp.194-210, Sept.1998.
N. Memon and P.W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Processing, vol.10, pp.643-649, Apr.2001.
C.L.Lei, P.L. Yu, P.L. Tsai, and M.H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE transactions on Image Processing, 13(12), pp.1618-1626, 2004.
H.S. Ju, H.J. Kim, D.H. Lee, and J.I. Lim, "An anonymous buyer-seller watermarking protocol with anonymity control," In: P.J.Lee, C.H. Lim(eds.) ICISC 2002, LNCS 2587, pp.421-432, 2003.
J.G. Choi, K. Sakurai, and J.H. Park, "Does it need trusted third party? Desing of buyer-seller watermarking protocol without trusted third party," In: J. Zhou M. Yung, Y. Han (eds.) ACNS 2003, LNCS 2846, pp.265-279, 2003.
B.M Goi, R.C.-W. Phan, Y.Yang, F.Bao, R.H.Deng, and M.U. Siddiqi, "Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity," In: M. Jakobsson, M. Yung, J. Zhou (eds.) ACNS 2004, LNCS 3089, pp.369-382, 2004.
용승림, 이상호, "신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법", 정보과학회논문지 : 시스템 및 이론, 제 34권 제 7호, pp.288-295, 정보과학회 (2007.8).
Min-Hua Shao, "A Privacy-preserving buyer-seller watermarking protocol with senti-trust third party." TrustBus 2007, LNCS 4667, pp.44-53, Springer-Verlag, 2007.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.