You are not logged in.
Openly accessible

An enhanced watermarking protocol for electronic copyright management

Zhang, Jun, Kou, Weidong and Fan, Kai 2006, An enhanced watermarking protocol for electronic copyright management, in SPCA : 1st International Symposium on Pervasive Computing and Applications, Institute of Electrical and Electronics Engineers, Beijing, China, pp. 528-533, doi: 10.1109/SPCA.2006.297449.

Attached Files
Name Description MIMEType Size Downloads
zhang-enhancedwatermarking-2006.pdf Published version application/pdf 5.63MB 179

Title An enhanced watermarking protocol for electronic copyright management
Author(s) Zhang, JunORCID iD for Zhang, Jun orcid.org/0000-0002-2189-7801
Kou, Weidong
Fan, Kai
Conference name Pervasive Computing and Applications. Symposium (1st. 2006 : Xinjiang, China)
Conference location Xinjiang, China
Conference dates 3-5 Aug. 2006
Title of proceedings SPCA : 1st International Symposium on Pervasive Computing and Applications
Editor(s) [unknown]
Publication date 2006
Series International Symposium on Pervasive Computing and Applications, pp.528-533, Urumqi, China, Aug. 2006
Conference series International Symposium on Pervasive Computing and Applications
Start page 528
End page 533
Publisher Institute of Electrical and Electronics Engineers
Place of publication Beijing, China
Summary In Piva et al's watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named "One Document to Multi-distributor" problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al's scheme by introducing document nature code (DNC) and register records table. In addition, our protocol offers the distributor an efficient means to verify his right to an authorized digital document.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9781424403264
Language eng
DOI 10.1109/SPCA.2006.297449
Field of Research 080303 Computer System Security
Socio Economic Objective 810107 National Security
HERDC Research category E1.1 Full written paper - refereed
Copyright notice ©2006, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30039517

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 225 Abstract Views, 179 File Downloads  -  Detailed Statistics
Created: Wed, 26 Oct 2011, 12:46:52 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.