A New Buyer-Seller Watermarking Protocol Without Double Embedding

Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each co...

Full description

Saved in:
Bibliographic Details
Published inShanghai jiao tong da xue xue bao Vol. 15; no. 4; pp. 397 - 402
Main Author 曾鹏 曹珍富 林煌
Format Journal Article
LanguageEnglish
Published Heidelberg Shanghai Jiaotong University Press 01.08.2010
Subjects
Online AccessGet full text
ISSN1007-1172
1995-8188
DOI10.1007/s12204-010-1023-1

Cover

Abstract Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al's scheme.
AbstractList Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al's scheme.
Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al ’s scheme.
Author 曾鹏 曹珍富 林煌
AuthorAffiliation Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, China
Author_xml – sequence: 1
  fullname: 曾鹏 曹珍富 林煌
BookMark eNp9kE1PwzAMhiM0JLbBD-AWcQ_ESdq0xzHGhzQBEqAdozT1tm5dA2krtH9PYDtziiO9j_3YIzJofIOEXAK_Bs71TQtCcMU4cAZcSAYnZAh5nrAMsmwQ6xhiAFqckVHbbjhXXMp8SCYT-ozf9LbfY2BvWNcY6MJ2GHY2bKtmRV-D77zzNV1U3dr3Hb3zfVEjne0KLMuYOCenS1u3eHF8x-TjfvY-fWTzl4en6WTOHGQCmLKlTrgWTquoqtJoaVGoUlqnsdBWWZmhkzqBItVOgNBo85QneZklXKUoxwQOfV3wbRtwaT5DFS33Brj5Xc8cbmD4319IA5ERB6aN2WaFwWx8H5qo-S90dRy09s3qK3KmsG67rGo0UulEQS7lD5FEai8
Cites_doi 10.1109/TIP.2005.859383
10.1006/jvci.1998.0391
10.1109/TIFS.2007.903849
10.1109/83.913598
10.1109/TIP.2004.837553
10.1145/359340.359342
10.1016/j.csi.2006.03.010
10.1016/j.jss.2005.11.577
10.1109/ICIP.1997.647966
10.1109/83.650120
10.1142/S0218001406004491
10.15388/Informatica.2006.132
10.1007/978-3-540-45203-4_21
ContentType Journal Article
Copyright Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2010
DBID 2RA
92L
CQIGP
W92
~WA
AAYXX
CITATION
DOI 10.1007/s12204-010-1023-1
DatabaseName 维普_期刊
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
Engineering
Architecture
Computer Science
DocumentTitleAlternate A New Buyer-Seller Watermarking Protocol Without Double Embedding
EISSN 1995-8188
EndPage 402
ExternalDocumentID 10_1007_s12204_010_1023_1
34754193
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
0R~
0VY
188
1N0
29~
2B.
2C0
2J2
2JN
2JY
2KG
2KM
2LR
2RA
2VQ
2~H
30V
4.4
406
408
40D
40E
5GY
5VR
5VS
6NX
8RM
8TC
92H
92I
92L
92R
93N
95-
95.
95~
96X
AAAVM
AABHQ
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AARHV
AARTL
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
ABDZT
ABECU
ABFGW
ABFTV
ABHQN
ABJOX
ABKAS
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTMW
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPRK
ACSNA
ACTTH
ACVWB
ACWMK
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMDM
ADRFC
ADTIX
ADURQ
ADYFF
ADZKW
AEBTG
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEOHA
AEPYU
AESTI
AETLH
AEVTX
AEXYK
AFGCZ
AFLOW
AFQWF
AFRAH
AFUIB
AFWTZ
AFZKB
AGAYW
AGDGC
AGGBP
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AINHJ
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMYLF
AMYQR
ARMRJ
AXYYD
B-.
BA0
BDATZ
BGNMA
CAG
CCEZO
CDYEO
CEKLB
CHBEP
COF
CQIGP
CS3
CSCUP
CW9
DNIVK
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FA0
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HZ~
IJ-
IPNFZ
IXC
IXD
I~X
I~Z
J-C
JBSCW
JZLTJ
KOV
LLZTM
M4Y
MA-
NQJWS
NU0
O9-
O9J
OK1
P9P
PF0
PT4
QOS
R89
R9I
RIG
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCL
SDH
SEG
SHX
SISQX
SNE
SNX
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TCJ
TGT
TSG
TSV
TUC
U2A
UG4
UGNYK
UNUBA
UOJIU
UTJUX
UZ4
UZXMN
VC2
VFIZW
W48
W92
WK8
YLTOR
Z7R
Z7Z
Z85
ZMTXR
~A9
~WA
-SC
-S~
AACDK
AAJBT
AASML
AATNV
AAXDM
AAYZH
ABAKF
ABJNI
ABTKH
ABWNU
ACAOD
ACDTI
ACPIV
ACZOJ
ADTPH
AEFQL
AEMSY
AESKC
AEVLU
AFBBN
AGQEE
AGRTI
AIGIU
AMXSW
AOCGG
CAJEC
DDRTE
DPUIP
IKXTQ
IWAJR
NPVJJ
Q--
SJYHP
SNPRN
SOHCF
U1G
U5M
UY8
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ID FETCH-LOGICAL-c1821-4ad75072c7412246102ae24d3ac7eb7a4a38ec3751b67c2127ea96059d85046e3
IEDL.DBID U2A
ISSN 1007-1172
IngestDate Wed Oct 01 03:05:48 EDT 2025
Fri Feb 21 02:37:21 EST 2025
Thu Nov 24 20:33:43 EST 2022
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords copy deterrence
double embedding
watermarking protocol
TP 309
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1821-4ad75072c7412246102ae24d3ac7eb7a4a38ec3751b67c2127ea96059d85046e3
Notes copy deterrence, watermarking protocol, double embedding
TP309
31-1943/U
PageCount 6
ParticipantIDs crossref_primary_10_1007_s12204_010_1023_1
springer_journals_10_1007_s12204_010_1023_1
chongqing_backfile_34754193
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20100800
PublicationDateYYYYMMDD 2010-08-01
PublicationDate_xml – month: 8
  year: 2010
  text: 20100800
PublicationDecade 2010
PublicationPlace Heidelberg
PublicationPlace_xml – name: Heidelberg
PublicationTitle Shanghai jiao tong da xue xue bao
PublicationTitleAbbrev J. Shanghai Jiaotong Univ. (Sci.)
PublicationTitleAlternate Journal of Shanghai Jiaotong university
PublicationYear 2010
Publisher Shanghai Jiaotong University Press
Publisher_xml – name: Shanghai Jiaotong University Press
References Rivest, Shamir, Adleman (CR14) 1978; 21
Cox, Kilian, Leighton (CR2) 1997; 6
Cox, Miller, Bloom (CR3) 2002
Hsu, Hou (CR5) 2006; 79
Choi, Sakurai, Park (CR8) 2003
Lou, Shieh, Tso (CR11) 2006; 20
Lei, Yu, Tsai (CR10) 2004; 13
Hassanien (CR4) 2006; 17
Hartung, Girod (CR13) 1997
Qiao, Nahrstedt (CR7) 1998; 9
Kuribayashi, Tanaka (CR6) 2005; 14
Memon, Wong (CR12) 2001; 10
Chen, Horng (CR1) 2007; 29
Frattolillo (CR9) 2007; 2
A. E. Hassanien (1023_CR4) 2006; 17
L. Qiao (1023_CR7) 1998; 9
C. L. Lei (1023_CR10) 2004; 13
I. J. Cox (1023_CR2) 1997; 6
F. Frattolillo (1023_CR9) 2007; 2
I. J. Cox (1023_CR3) 2002
F. Hartung (1023_CR13) 1997
D. C. Lou (1023_CR11) 2006; 20
C. S. Hsu (1023_CR5) 2006; 79
N. Memon (1023_CR12) 2001; 10
T. H. Chen (1023_CR1) 2007; 29
J. G. Choi (1023_CR8) 2003
M. Kuribayashi (1023_CR6) 2005; 14
R. L. Rivest (1023_CR14) 1978; 21
References_xml – volume: 14
  start-page: 2129
  issue: 12
  year: 2005
  end-page: 2139
  ident: CR6
  article-title: Fingerprinting protocol for images based on additive homomorphic property [J]
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2005.859383
– volume: 9
  start-page: 194
  issue: 3
  year: 1998
  end-page: 210
  ident: CR7
  article-title: Watermarking schemes and protocols for protecting rightful ownerships and customer’s rights [J]
  publication-title: Journal of Visual Communication and Image Representation
  doi: 10.1006/jvci.1998.0391
– volume: 2
  start-page: 350
  issue: 3
  year: 2007
  end-page: 363
  ident: CR9
  article-title: Watermarking protocol for web context [J]
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2007.903849
– volume: 10
  start-page: 643
  issue: 4
  year: 2001
  end-page: 649
  ident: CR12
  article-title: A buyer-seller watermarking protocol [J]
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.913598
– volume: 17
  start-page: 187
  issue: 2
  year: 2006
  end-page: 198
  ident: CR4
  article-title: A copyright protection using watermarking algorithm [J]
  publication-title: Informatica
– volume: 13
  start-page: 1618
  issue: 12
  year: 2004
  end-page: 1626
  ident: CR10
  article-title: An efficient and anonymous buyer-seller watermarking protocol [J]
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2004.837553
– start-page: 265
  year: 2003
  end-page: 279
  ident: CR8
  article-title: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party [C]
  publication-title: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS 2003), LNCS
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  end-page: 126
  ident: CR14
  article-title: A method for obtaining digital signatures and public key cryptosystems [J]
  publication-title: Communications of the ACM
  doi: 10.1145/359340.359342
– volume: 29
  start-page: 229
  issue: 2
  year: 2007
  end-page: 237
  ident: CR1
  article-title: A lightweight and anonymous copyright-protection protocol [J]
  publication-title: Computer Standards and Interfaces
  doi: 10.1016/j.csi.2006.03.010
– volume: 79
  start-page: 1130
  issue: 8
  year: 2006
  end-page: 1140
  ident: CR5
  article-title: An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods [J]
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2005.11.577
– start-page: 528
  year: 1997
  end-page: 531
  ident: CR13
  article-title: Fast public-key watermarking of compressed video [C]
  publication-title: Proceedings of the IEEE International Conference on Image Processing
  doi: 10.1109/ICIP.1997.647966
– volume: 6
  start-page: 1673
  issue: 12
  year: 1997
  end-page: 1687
  ident: CR2
  article-title: Secure spread spectrum watermarking for multimedia [J]
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.650120
– volume: 20
  start-page: 79
  issue: 1
  year: 2006
  end-page: 90
  ident: CR11
  article-title: A robust buyerseller watermarking scheme based on DWT [J]
  publication-title: International Journal of Pattern Recognition and Artificial Intelligence
  doi: 10.1142/S0218001406004491
– year: 2002
  ident: CR3
  publication-title: Digital watermarking [M]
– volume: 6
  start-page: 1673
  issue: 12
  year: 1997
  ident: 1023_CR2
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.650120
– volume: 20
  start-page: 79
  issue: 1
  year: 2006
  ident: 1023_CR11
  publication-title: International Journal of Pattern Recognition and Artificial Intelligence
  doi: 10.1142/S0218001406004491
– volume: 79
  start-page: 1130
  issue: 8
  year: 2006
  ident: 1023_CR5
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2005.11.577
– volume: 17
  start-page: 187
  issue: 2
  year: 2006
  ident: 1023_CR4
  publication-title: Informatica
  doi: 10.15388/Informatica.2006.132
– volume: 13
  start-page: 1618
  issue: 12
  year: 2004
  ident: 1023_CR10
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2004.837553
– volume: 9
  start-page: 194
  issue: 3
  year: 1998
  ident: 1023_CR7
  publication-title: Journal of Visual Communication and Image Representation
  doi: 10.1006/jvci.1998.0391
– volume: 2
  start-page: 350
  issue: 3
  year: 2007
  ident: 1023_CR9
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2007.903849
– volume-title: Digital watermarking [M]
  year: 2002
  ident: 1023_CR3
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  ident: 1023_CR14
  publication-title: Communications of the ACM
  doi: 10.1145/359340.359342
– volume: 10
  start-page: 643
  issue: 4
  year: 2001
  ident: 1023_CR12
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/83.913598
– volume: 29
  start-page: 229
  issue: 2
  year: 2007
  ident: 1023_CR1
  publication-title: Computer Standards and Interfaces
  doi: 10.1016/j.csi.2006.03.010
– volume: 14
  start-page: 2129
  issue: 12
  year: 2005
  ident: 1023_CR6
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2005.859383
– start-page: 265
  volume-title: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS 2003), LNCS
  year: 2003
  ident: 1023_CR8
  doi: 10.1007/978-3-540-45203-4_21
– start-page: 528
  volume-title: Proceedings of the IEEE International Conference on Image Processing
  year: 1997
  ident: 1023_CR13
  doi: 10.1109/ICIP.1997.647966
SSID ssj0040339
Score 1.7666997
Snippet Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally...
SourceID crossref
springer
chongqing
SourceType Index Database
Publisher
StartPage 397
SubjectTerms Architecture
Computer Science
Electrical Engineering
Engineering
Life Sciences
Materials Science
Title A New Buyer-Seller Watermarking Protocol Without Double Embedding
URI http://lib.cqvip.com/qk/85391X/20104/34754193.html
https://link.springer.com/article/10.1007/s12204-010-1023-1
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1995-8188
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0040339
  issn: 1007-1172
  databaseCode: AFBBN
  dateStart: 20080201
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1995-8188
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0040339
  issn: 1007-1172
  databaseCode: AGYKE
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1995-8188
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0040339
  issn: 1007-1172
  databaseCode: U2A
  dateStart: 20080201
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH7IdlFBXVWc05GDB38Q6Jqk2Y5FNoeiJwfzVJomU1Bb3Vb8933JWreBHjy2vLSQH-9938vLF4AzljJhlAio9lVIueQTisxWUkT3HaO1DKUTcb1_CIcjfjsW4_Ic96yqdq-2JJ2nXh52CwJXMeFTKzdAkfLUhVXzwkk8CqLK_XKfuevDbBvawfBcbWX-9gkrqPCSZ8-f-Lv1wLS-K-qCzWAPdkqUSKLFsDZgw2QebEcrSX8PdqsLGUi5Pj3YWlEX9KBRvp-R81Jc-mIfooggkCaqQKhNZzZrPyVfifPPLmtOrHBDjrOD2AxtXsyJzgv1Zoh5V9iraHEAo0H_8XpIy2sUaIrkARliohEWyCBF8ODk4_wgMQHXLEmlUTLhCeualEnRUaFMreK7SZDXiJ7uCmTPhh1CLcszcwSEh2rCTYIYRoRWlqerJ0JzM-kiF9W9tNeE1k9_YhhOX624VMy4FByBYhMuqx6OPxZaGvFSNdkOTey754DFnSZcVWMQl8tq9rf18b-sW7C5KAKwdXwnUJtPC3OK2GKu2lCPbp7u-m03p74BnGXD7g
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwEB2hcmCRWAqIsvrAgUVGaWzH7TFChbL1VCQ4RfFSkIAGaCMkvp6xm0CL4MAxkbPO2POeZ_wMsMc0E1aJkJpARZRL3qPIbCVFdF-3xshIehHX607UvuEXt-K2WMc9KKvdy5SkH6m_F7uFoa-YCKiTG6BIeaY58pOwAtPx2d1lqxyAecD8BmLuKlrHAF0mM3-7iZNUeMj696_4wMnQNJkX9eHmdBG65YuOqkwej_OhOtYfPzQc__klS7BQwE8Sj_xlGaZsvwrz8Vg2oQqL5U4PpOj4VZgbky2swnJxfkD2C9XqgxWIY4IInagcMTwduHTAG3lP_cDvp-OJU4TI0O2Im_rN8iExWa6eLLHPCs2FLVbh5rTVPWnTYn8GqpGVIPVMDeINGWpEJV6XLghTG3LDUi2tkilPWcNqJkVdRVI7KXmbImESTdMQSMstW4NKP-vbdSA8Uj1uUwRHInJ6Pw3TE4bbXgNJrmnqZg02v8yE8V0_OtWqhHEpOCLQGhyWhkteRiIdybccs_vZSeCPQ5bUa3BUWiUp-uvg79Yb_2q9CzPt7vVVcnXeudyE2VGlgSsW3ILK8C232whghmqncNhPJLDh7g
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ1bS8MwFMcPoiAqeJmKc17y4IMXwromabbHoo55Gz442FtpmlRBbecu-PU9yVrdQB98bElbyKXnf3JOfgfghCVMGCV8qj0VUC55StGzlRTVfcNoLQPpIK4P3aDT47d90S_qnI7KbPcyJDk902ApTdm4PtBp_efgm--77AmPWvQARfdniVtOAk7onh-Wv2LuMVdKzD5DG2iqy7Dmb6-wcIWXPHv-wE_PG6n5CKkzPO1NWC8UIwmnQ7wFCyarwFo4EwCowEZZnIEUa7UCqzOkwQpsFfdH5LQATZ9tQxgSFNVETVB205HdwR-Sz9j9q90OOrEQhxxnCrG7tflkTHQ-UW-GmHeFPYwtdqDXvn667NCipAJN0JFAbzHWKBGkn6CQcCg5z4-NzzWLE2mUjHnMmiZhUjRUIBNLfzcx-jiipZsCPWnDdmExyzOzB4QHKuUmRj0jAovoaepUaG7SJvqlupW0qlD77k80ycmrBU1FjEvBUTRW4bzs4Wgw5WpEPwRlOzSR5659FjWqcFGOQVQssdHfrff_1foYlh-v2tH9TfeuBivT3ACb3ncAi-PhxByi5BirIzetvgCWGsmC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+buyer-seller+watermarking+protocol+without+double+embedding&rft.jtitle=Shanghai+jiao+tong+da+xue+xue+bao&rft.au=Zeng%2C+Peng&rft.au=Cao%2C+Zhen-fu&rft.au=Lin%2C+Huang&rft.date=2010-08-01&rft.pub=Shanghai+Jiaotong+University+Press&rft.issn=1007-1172&rft.eissn=1995-8188&rft.volume=15&rft.issue=4&rft.spage=397&rft.epage=402&rft_id=info:doi/10.1007%2Fs12204-010-1023-1&rft.externalDocID=10_1007_s12204_010_1023_1
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F85391X%2F85391X.jpg