Thursday 25th of April 2024
 

Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol


Neelesh Mehra and Madhu Shandilya

A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. Up to now many secure BSW protocol has been suggested but the common problem with all of them is that in all of them is the buyers involvement in generation of some cryptographic key or watermark or digital signature what happened if buyer is not capable or is a layman and does not understand what cryptography and watermarking means. In this paper we proposed the use of open access identification concept for this buyer has to get registered with some trusted third party which after registration provide an open access ID which is unique. This not only provide anonymity to buyer but the seller can also provide some benefit to his loyal customers. In our scheme non of the watermark or cryptographic key is generated by buyer so a layman buyer can also use it. It also enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer.

Keywords: Buyer-Seller watermarking protocols; watermarking; copy protection; copyright protection

Download Full-Text


ABOUT THE AUTHORS

Neelesh Mehra
Department Of Electronics and Communication, S.A.T.I(Engg.)College, Vidisha, M.P, India.

Madhu Shandilya
Department Of Electronics, M.A.N.I.T, Bhopal, M.P, India


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »