{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T06:12:21Z","timestamp":1744697541286,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_29","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"421-432","source":"Crossref","is-referenced-by-count":24,"title":["An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control"],"prefix":"10.1007","author":[{"given":"Hak","family":"Soo Ju","sequence":"first","affiliation":[]},{"given":"Hyun","family":"Jeong Kim","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Hoon Lee","sequence":"additional","affiliation":[]},{"given":"Jong","family":"In Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"issue":"4","key":"29_CR1","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"N. Asokan, V. Shoup, and M. Waidner, Optimistic fair exchange of digital signatures, IEEE Journal on selected Areas in communications, 18(4), pp.591\u2013610, Apr.2000. 423, 426","journal-title":"IEEE Journal on selected Areas in communications"},{"key":"29_CR2","series-title":"Lect Notes Comput Sci","volume-title":"CARDIS\u201998","author":"F. Bao","year":"2000","unstructured":"F. Bao, An Efficient Verifiable Encryption scheme for Encryption of Discrete Logarithms, CARDIS\u201998, vol.1820 of LNCS2000. 423, 426"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"S. Brands Untraceable Off-line Cash in Wallets with Observers Advances In Cryptology: Proc of CRYPTO\u201993, pp.302\u2013318, 1994. 423","DOI":"10.1007\/3-540-48329-2_26"},{"key":"29_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Crypto\u201985","author":"G. R. Blakley","year":"1986","unstructured":"G. R. Blakley, C. Meadows, G.B. Purdy Fingerprinting Long Forgiving Messages, Crypto\u201985, LNCS 218, Springer-Verlag, Berlin 1986, 180\u2013189. 421, 423"},{"key":"29_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u201995","author":"D. Boneh","year":"1995","unstructured":"D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, Crypto\u201995, LNCS 963, pp. 452\u2013465, Springer-Verlag, Berlin, 1995. 421, 422, 423"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch and I. Damgard, Verifiable encryption and applications to group signatures and signatures sharing, Technical Report RS 98-32, Brics, Department of Computer Science, University of Aarhus, Dec.1998. 423, 426","DOI":"10.7146\/brics.v5i32.19438"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash Advances in Cryptology-CRYPTO\u201988, pp.319\u2013327,1990. 423","DOI":"10.1007\/0-387-34799-2_25"},{"issue":"12","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for images, audio and video, IEEE Trans.on Image Processing, vol.6, no.12, pp.1673\u20131678, 1997. 421, 422","journal-title":"IEEE Trans.on Image Processing"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, Can Invisible Watermarks Resolve Rightful Ownership?, IBM research Report, RC 20509, July 25, 1996. 421","DOI":"10.1117\/12.263419"},{"key":"29_CR10","unstructured":"S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, Resolving Rightful Ownership with invisible Watermarking Techniques: Limitations, Attacks and implications, Technical report, IBM Research Report RC 20755, March1997."},{"key":"29_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/10719724_8","volume-title":"Zero Knowledge Watermark Detection","author":"S. Craver","year":"2000","unstructured":"S. Craver, Zero Knowledge Watermark Detection, Proceedings of the Third International workship on Information Hiding, Springer Lecture Notes in Computer Science, vol.1768, pp.101\u2013116, 2000."},{"key":"29_CR12","unstructured":"Joe Killian, F. Thomson Leighton, Lesley R. Matheson, Talal G. Shamoon, Robert E. Tarjan, and Francis Zane, Resistance of Digital Watermarks to Collusive Attacks, Proceedings of the IEEE International Symposium on Information Theory, 1998. 422"},{"key":"29_CR13","unstructured":"Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. Pseudonym systems http:\/\/theory.lcs.mit.edu\/ anna\/lrsw99.ps , 1999. 423"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"N. Memon and P. W. Wong, A Buyer-Seller Watermarking Protocol based on amplitude Modulation and the ElGamal Public Key Cryptosystem, Proceedings of SPIE99, vol3657. 426","DOI":"10.1117\/12.344679"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"N. Memon and P. W. Wong, A Buyer-Seller Watermarking Protocol, IEEE Transactions on image processing, vol.10, no.4, April 2001. 422, 423, 426, 428, 430","DOI":"10.1109\/83.913598"},{"key":"29_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u201996","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and M. Schunter, Asymmetric Fingerprinting, Eurocrypt\u201996, LNCS 1070, pp.84\u201395, Springer-Verlag, Berlin 1996. 422, 423, 428"},{"key":"29_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Eurocrypt\u201997","author":"B. Pfitzmann","year":"1997","unstructured":"B. Pfitzmann and M. Waidner, Anonymous Fingerprinting, Eurocrypt\u201997, LNCS 1233, Spring-Verlag, Berlin 1997, 88\u2013102422, 423, 428"},{"key":"29_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/BFb0024619","volume-title":"Eurocrypt\u201999","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and Ahmad-Reza Sadeghi, Coin-Based Anonymous Fingerprinting, Eurocrypt\u201999, LNCS 1592, Spring-Verlag, Berlin 1996, 150\u2013164. 422, 423"},{"key":"29_CR19","series-title":"Lect Notes Comput Sci","first-page":"173","volume-title":"Enrocrypt2000","author":"G. Poupard","year":"2000","unstructured":"G. Poupard and J. Stern, Fair Encryption of RSA Keys, Enrocrypt2000, LNCS, pp.173\u2013190, Springer-Verlag, 2000. 423, 426"},{"key":"29_CR20","unstructured":"L. Qian and K. Nahrstedt, Watermarking Schemes and Protocols for Protection Rightful Ownership and Customer\u2019s Rights, Academic Press Journal of Visual Communication and Image Representation, 1998. 422, 423"},{"key":"29_CR21","unstructured":"M. Ramkumar and A. N. Akansu, Image Watermarks and Counterfeit Attacks: Some Problems and Solutions, Content Security and Data Hiding in Digital Media, Newark, NJ, May 14, 1999. 421"},{"key":"29_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Eurocrypt\u201996","author":"M. Stadler","year":"191-199","unstructured":"M. Stadler, Public verifiable secret sharing, Eurocrypt\u201996, LNCS 1070, pp.191-199, Springer Verlag, 1996. 423, 426"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:10:02Z","timestamp":1737076202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}