A New Buyer-Seller Watermarking Protocol Without Double Embedding
Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each co...
        Saved in:
      
    
          | Published in | Shanghai jiao tong da xue xue bao Vol. 15; no. 4; pp. 397 - 402 | 
|---|---|
| Main Author | |
| Format | Journal Article | 
| Language | English | 
| Published | 
        Heidelberg
          Shanghai Jiaotong University Press
    
        01.08.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1007-1172 1995-8188  | 
| DOI | 10.1007/s12204-010-1023-1 | 
Cover
| Abstract | Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al's scheme. | 
    
|---|---|
| AbstractList | Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al's scheme. Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al ’s scheme.  | 
    
| Author | 曾鹏 曹珍富 林煌 | 
    
| AuthorAffiliation | Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, China | 
    
| Author_xml | – sequence: 1 fullname: 曾鹏 曹珍富 林煌  | 
    
| BookMark | eNp9kE1PwzAMhiM0JLbBD-AWcQ_ESdq0xzHGhzQBEqAdozT1tm5dA2krtH9PYDtziiO9j_3YIzJofIOEXAK_Bs71TQtCcMU4cAZcSAYnZAh5nrAMsmwQ6xhiAFqckVHbbjhXXMp8SCYT-ozf9LbfY2BvWNcY6MJ2GHY2bKtmRV-D77zzNV1U3dr3Hb3zfVEjne0KLMuYOCenS1u3eHF8x-TjfvY-fWTzl4en6WTOHGQCmLKlTrgWTquoqtJoaVGoUlqnsdBWWZmhkzqBItVOgNBo85QneZklXKUoxwQOfV3wbRtwaT5DFS33Brj5Xc8cbmD4319IA5ERB6aN2WaFwWx8H5qo-S90dRy09s3qK3KmsG67rGo0UulEQS7lD5FEai8 | 
    
| Cites_doi | 10.1109/TIP.2005.859383 10.1006/jvci.1998.0391 10.1109/TIFS.2007.903849 10.1109/83.913598 10.1109/TIP.2004.837553 10.1145/359340.359342 10.1016/j.csi.2006.03.010 10.1016/j.jss.2005.11.577 10.1109/ICIP.1997.647966 10.1109/83.650120 10.1142/S0218001406004491 10.15388/Informatica.2006.132 10.1007/978-3-540-45203-4_21  | 
    
| ContentType | Journal Article | 
    
| Copyright | Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2010 | 
    
| Copyright_xml | – notice: Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2010 | 
    
| DBID | 2RA 92L CQIGP W92 ~WA AAYXX CITATION  | 
    
| DOI | 10.1007/s12204-010-1023-1 | 
    
| DatabaseName | 维普_期刊 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 CrossRef  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Sciences (General) Engineering Architecture Computer Science  | 
    
| DocumentTitleAlternate | A New Buyer-Seller Watermarking Protocol Without Double Embedding | 
    
| EISSN | 1995-8188 | 
    
| EndPage | 402 | 
    
| ExternalDocumentID | 10_1007_s12204_010_1023_1 34754193  | 
    
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 188 1N0 29~ 2B. 2C0 2J2 2JN 2JY 2KG 2KM 2LR 2RA 2VQ 2~H 30V 4.4 406 408 40D 40E 5GY 5VR 5VS 6NX 8RM 8TC 92H 92I 92L 92R 93N 95- 95. 95~ 96X AAAVM AABHQ AAFGU AAHNG AAIAL AAJKR AANZL AARHV AARTL AATVU AAUYE AAWCG AAYIU AAYQN AAYTO ABDZT ABECU ABFGW ABFTV ABHQN ABJOX ABKAS ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTMW ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPRK ACSNA ACTTH ACVWB ACWMK ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADRFC ADTIX ADURQ ADYFF ADZKW AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AEOHA AEPYU AESTI AETLH AEVTX AEXYK AFGCZ AFLOW AFQWF AFRAH AFUIB AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AINHJ AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMYLF AMYQR ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG CCEZO CDYEO CEKLB CHBEP COF CQIGP CS3 CSCUP CW9 DNIVK DU5 EBLON EBS EIOEI EJD ESBYG FA0 FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IPNFZ IXC IXD I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NQJWS NU0 O9- O9J OK1 P9P PF0 PT4 QOS R89 R9I RIG ROL RPX RSV S16 S1Z S27 S3B SAP SCL SDH SEG SHX SISQX SNE SNX SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TCJ TGT TSG TSV TUC U2A UG4 UGNYK UNUBA UOJIU UTJUX UZ4 UZXMN VC2 VFIZW W48 W92 WK8 YLTOR Z7R Z7Z Z85 ZMTXR ~A9 ~WA -SC -S~ AACDK AAJBT AASML AATNV AAXDM AAYZH ABAKF ABJNI ABTKH ABWNU ACAOD ACDTI ACPIV ACZOJ ADTPH AEFQL AEMSY AESKC AEVLU AFBBN AGQEE AGRTI AIGIU AMXSW AOCGG CAJEC DDRTE DPUIP IKXTQ IWAJR NPVJJ Q-- SJYHP SNPRN SOHCF U1G U5M UY8 AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION  | 
    
| ID | FETCH-LOGICAL-c1821-4ad75072c7412246102ae24d3ac7eb7a4a38ec3751b67c2127ea96059d85046e3 | 
    
| IEDL.DBID | U2A | 
    
| ISSN | 1007-1172 | 
    
| IngestDate | Wed Oct 01 03:05:48 EDT 2025 Fri Feb 21 02:37:21 EST 2025 Thu Nov 24 20:33:43 EST 2022  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 4 | 
    
| Keywords | copy deterrence double embedding watermarking protocol TP 309  | 
    
| Language | English | 
    
| License | http://www.springer.com/tdm | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c1821-4ad75072c7412246102ae24d3ac7eb7a4a38ec3751b67c2127ea96059d85046e3 | 
    
| Notes | copy deterrence, watermarking protocol, double embedding TP309 31-1943/U  | 
    
| PageCount | 6 | 
    
| ParticipantIDs | crossref_primary_10_1007_s12204_010_1023_1 springer_journals_10_1007_s12204_010_1023_1 chongqing_backfile_34754193  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20100800 | 
    
| PublicationDateYYYYMMDD | 2010-08-01 | 
    
| PublicationDate_xml | – month: 8 year: 2010 text: 20100800  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Heidelberg | 
    
| PublicationPlace_xml | – name: Heidelberg | 
    
| PublicationTitle | Shanghai jiao tong da xue xue bao | 
    
| PublicationTitleAbbrev | J. Shanghai Jiaotong Univ. (Sci.) | 
    
| PublicationTitleAlternate | Journal of Shanghai Jiaotong university | 
    
| PublicationYear | 2010 | 
    
| Publisher | Shanghai Jiaotong University Press | 
    
| Publisher_xml | – name: Shanghai Jiaotong University Press | 
    
| References | Rivest, Shamir, Adleman (CR14) 1978; 21 Cox, Kilian, Leighton (CR2) 1997; 6 Cox, Miller, Bloom (CR3) 2002 Hsu, Hou (CR5) 2006; 79 Choi, Sakurai, Park (CR8) 2003 Lou, Shieh, Tso (CR11) 2006; 20 Lei, Yu, Tsai (CR10) 2004; 13 Hassanien (CR4) 2006; 17 Hartung, Girod (CR13) 1997 Qiao, Nahrstedt (CR7) 1998; 9 Kuribayashi, Tanaka (CR6) 2005; 14 Memon, Wong (CR12) 2001; 10 Chen, Horng (CR1) 2007; 29 Frattolillo (CR9) 2007; 2 A. E. Hassanien (1023_CR4) 2006; 17 L. Qiao (1023_CR7) 1998; 9 C. L. Lei (1023_CR10) 2004; 13 I. J. Cox (1023_CR2) 1997; 6 F. Frattolillo (1023_CR9) 2007; 2 I. J. Cox (1023_CR3) 2002 F. Hartung (1023_CR13) 1997 D. C. Lou (1023_CR11) 2006; 20 C. S. Hsu (1023_CR5) 2006; 79 N. Memon (1023_CR12) 2001; 10 T. H. Chen (1023_CR1) 2007; 29 J. G. Choi (1023_CR8) 2003 M. Kuribayashi (1023_CR6) 2005; 14 R. L. Rivest (1023_CR14) 1978; 21  | 
    
| References_xml | – volume: 14 start-page: 2129 issue: 12 year: 2005 end-page: 2139 ident: CR6 article-title: Fingerprinting protocol for images based on additive homomorphic property [J] publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2005.859383 – volume: 9 start-page: 194 issue: 3 year: 1998 end-page: 210 ident: CR7 article-title: Watermarking schemes and protocols for protecting rightful ownerships and customer’s rights [J] publication-title: Journal of Visual Communication and Image Representation doi: 10.1006/jvci.1998.0391 – volume: 2 start-page: 350 issue: 3 year: 2007 end-page: 363 ident: CR9 article-title: Watermarking protocol for web context [J] publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2007.903849 – volume: 10 start-page: 643 issue: 4 year: 2001 end-page: 649 ident: CR12 article-title: A buyer-seller watermarking protocol [J] publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.913598 – volume: 17 start-page: 187 issue: 2 year: 2006 end-page: 198 ident: CR4 article-title: A copyright protection using watermarking algorithm [J] publication-title: Informatica – volume: 13 start-page: 1618 issue: 12 year: 2004 end-page: 1626 ident: CR10 article-title: An efficient and anonymous buyer-seller watermarking protocol [J] publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2004.837553 – start-page: 265 year: 2003 end-page: 279 ident: CR8 article-title: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party [C] publication-title: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS 2003), LNCS – volume: 21 start-page: 120 issue: 2 year: 1978 end-page: 126 ident: CR14 article-title: A method for obtaining digital signatures and public key cryptosystems [J] publication-title: Communications of the ACM doi: 10.1145/359340.359342 – volume: 29 start-page: 229 issue: 2 year: 2007 end-page: 237 ident: CR1 article-title: A lightweight and anonymous copyright-protection protocol [J] publication-title: Computer Standards and Interfaces doi: 10.1016/j.csi.2006.03.010 – volume: 79 start-page: 1130 issue: 8 year: 2006 end-page: 1140 ident: CR5 article-title: An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods [J] publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2005.11.577 – start-page: 528 year: 1997 end-page: 531 ident: CR13 article-title: Fast public-key watermarking of compressed video [C] publication-title: Proceedings of the IEEE International Conference on Image Processing doi: 10.1109/ICIP.1997.647966 – volume: 6 start-page: 1673 issue: 12 year: 1997 end-page: 1687 ident: CR2 article-title: Secure spread spectrum watermarking for multimedia [J] publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.650120 – volume: 20 start-page: 79 issue: 1 year: 2006 end-page: 90 ident: CR11 article-title: A robust buyerseller watermarking scheme based on DWT [J] publication-title: International Journal of Pattern Recognition and Artificial Intelligence doi: 10.1142/S0218001406004491 – year: 2002 ident: CR3 publication-title: Digital watermarking [M] – volume: 6 start-page: 1673 issue: 12 year: 1997 ident: 1023_CR2 publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.650120 – volume: 20 start-page: 79 issue: 1 year: 2006 ident: 1023_CR11 publication-title: International Journal of Pattern Recognition and Artificial Intelligence doi: 10.1142/S0218001406004491 – volume: 79 start-page: 1130 issue: 8 year: 2006 ident: 1023_CR5 publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2005.11.577 – volume: 17 start-page: 187 issue: 2 year: 2006 ident: 1023_CR4 publication-title: Informatica doi: 10.15388/Informatica.2006.132 – volume: 13 start-page: 1618 issue: 12 year: 2004 ident: 1023_CR10 publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2004.837553 – volume: 9 start-page: 194 issue: 3 year: 1998 ident: 1023_CR7 publication-title: Journal of Visual Communication and Image Representation doi: 10.1006/jvci.1998.0391 – volume: 2 start-page: 350 issue: 3 year: 2007 ident: 1023_CR9 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2007.903849 – volume-title: Digital watermarking [M] year: 2002 ident: 1023_CR3 – volume: 21 start-page: 120 issue: 2 year: 1978 ident: 1023_CR14 publication-title: Communications of the ACM doi: 10.1145/359340.359342 – volume: 10 start-page: 643 issue: 4 year: 2001 ident: 1023_CR12 publication-title: IEEE Transactions on Image Processing doi: 10.1109/83.913598 – volume: 29 start-page: 229 issue: 2 year: 2007 ident: 1023_CR1 publication-title: Computer Standards and Interfaces doi: 10.1016/j.csi.2006.03.010 – volume: 14 start-page: 2129 issue: 12 year: 2005 ident: 1023_CR6 publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2005.859383 – start-page: 265 volume-title: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS 2003), LNCS year: 2003 ident: 1023_CR8 doi: 10.1007/978-3-540-45203-4_21 – start-page: 528 volume-title: Proceedings of the IEEE International Conference on Image Processing year: 1997 ident: 1023_CR13 doi: 10.1109/ICIP.1997.647966  | 
    
| SSID | ssj0040339 | 
    
| Score | 1.7666997 | 
    
| Snippet | Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally... | 
    
| SourceID | crossref springer chongqing  | 
    
| SourceType | Index Database Publisher  | 
    
| StartPage | 397 | 
    
| SubjectTerms | Architecture Computer Science Electrical Engineering Engineering Life Sciences Materials Science  | 
    
| Title | A New Buyer-Seller Watermarking Protocol Without Double Embedding | 
    
| URI | http://lib.cqvip.com/qk/85391X/20104/34754193.html https://link.springer.com/article/10.1007/s12204-010-1023-1  | 
    
| Volume | 15 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1995-8188 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: AFBBN dateStart: 20080201 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1995-8188 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: AGYKE dateStart: 20080101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1995-8188 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: U2A dateStart: 20080201 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH7IdlFBXVWc05GDB38Q6Jqk2Y5FNoeiJwfzVJomU1Bb3Vb8933JWreBHjy2vLSQH-9938vLF4AzljJhlAio9lVIueQTisxWUkT3HaO1DKUTcb1_CIcjfjsW4_Ic96yqdq-2JJ2nXh52CwJXMeFTKzdAkfLUhVXzwkk8CqLK_XKfuevDbBvawfBcbWX-9gkrqPCSZ8-f-Lv1wLS-K-qCzWAPdkqUSKLFsDZgw2QebEcrSX8PdqsLGUi5Pj3YWlEX9KBRvp-R81Jc-mIfooggkCaqQKhNZzZrPyVfifPPLmtOrHBDjrOD2AxtXsyJzgv1Zoh5V9iraHEAo0H_8XpIy2sUaIrkARliohEWyCBF8ODk4_wgMQHXLEmlUTLhCeualEnRUaFMreK7SZDXiJ7uCmTPhh1CLcszcwSEh2rCTYIYRoRWlqerJ0JzM-kiF9W9tNeE1k9_YhhOX624VMy4FByBYhMuqx6OPxZaGvFSNdkOTey754DFnSZcVWMQl8tq9rf18b-sW7C5KAKwdXwnUJtPC3OK2GKu2lCPbp7u-m03p74BnGXD7g | 
    
| linkProvider | Springer Nature | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwEB2hcmCRWAqIsvrAgUVGaWzH7TFChbL1VCQ4RfFSkIAGaCMkvp6xm0CL4MAxkbPO2POeZ_wMsMc0E1aJkJpARZRL3qPIbCVFdF-3xshIehHX607UvuEXt-K2WMc9KKvdy5SkH6m_F7uFoa-YCKiTG6BIeaY58pOwAtPx2d1lqxyAecD8BmLuKlrHAF0mM3-7iZNUeMj696_4wMnQNJkX9eHmdBG65YuOqkwej_OhOtYfPzQc__klS7BQwE8Sj_xlGaZsvwrz8Vg2oQqL5U4PpOj4VZgbky2swnJxfkD2C9XqgxWIY4IInagcMTwduHTAG3lP_cDvp-OJU4TI0O2Im_rN8iExWa6eLLHPCs2FLVbh5rTVPWnTYn8GqpGVIPVMDeINGWpEJV6XLghTG3LDUi2tkilPWcNqJkVdRVI7KXmbImESTdMQSMstW4NKP-vbdSA8Uj1uUwRHInJ6Pw3TE4bbXgNJrmnqZg02v8yE8V0_OtWqhHEpOCLQGhyWhkteRiIdybccs_vZSeCPQ5bUa3BUWiUp-uvg79Yb_2q9CzPt7vVVcnXeudyE2VGlgSsW3ILK8C232whghmqncNhPJLDh7g | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ1bS8MwFMcPoiAqeJmKc17y4IMXwromabbHoo55Gz442FtpmlRBbecu-PU9yVrdQB98bElbyKXnf3JOfgfghCVMGCV8qj0VUC55StGzlRTVfcNoLQPpIK4P3aDT47d90S_qnI7KbPcyJDk902ApTdm4PtBp_efgm--77AmPWvQARfdniVtOAk7onh-Wv2LuMVdKzD5DG2iqy7Dmb6-wcIWXPHv-wE_PG6n5CKkzPO1NWC8UIwmnQ7wFCyarwFo4EwCowEZZnIEUa7UCqzOkwQpsFfdH5LQATZ9tQxgSFNVETVB205HdwR-Sz9j9q90OOrEQhxxnCrG7tflkTHQ-UW-GmHeFPYwtdqDXvn667NCipAJN0JFAbzHWKBGkn6CQcCg5z4-NzzWLE2mUjHnMmiZhUjRUIBNLfzcx-jiipZsCPWnDdmExyzOzB4QHKuUmRj0jAovoaepUaG7SJvqlupW0qlD77k80ycmrBU1FjEvBUTRW4bzs4Wgw5WpEPwRlOzSR5659FjWqcFGOQVQssdHfrff_1foYlh-v2tH9TfeuBivT3ACb3ncAi-PhxByi5BirIzetvgCWGsmC | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+buyer-seller+watermarking+protocol+without+double+embedding&rft.jtitle=Shanghai+jiao+tong+da+xue+xue+bao&rft.au=Zeng%2C+Peng&rft.au=Cao%2C+Zhen-fu&rft.au=Lin%2C+Huang&rft.date=2010-08-01&rft.pub=Shanghai+Jiaotong+University+Press&rft.issn=1007-1172&rft.eissn=1995-8188&rft.volume=15&rft.issue=4&rft.spage=397&rft.epage=402&rft_id=info:doi/10.1007%2Fs12204-010-1023-1&rft.externalDocID=10_1007_s12204_010_1023_1 | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F85391X%2F85391X.jpg |