{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:21Z","timestamp":1740122841035,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Foundation for Innovative Research Groups of the Natural Science Foundation of Hunan Province","award":["2020JJ1003"],"award-info":[{"award-number":["2020JJ1003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41201389"],"award-info":[{"award-number":["41201389"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-022-13002-y","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T02:02:27Z","timestamp":1652752947000},"page":"41079-41101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A TTP watermarking protocol based on visual cryptography"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6996-8218","authenticated-orcid":false,"given":"Baiyan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuwei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"issue":"10","key":"13002_CR1","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/TIFS.2014.2340581","volume":"9","author":"T Bianchi","year":"2014","unstructured":"Bianchi T, Piva A (2014) TTP-free asymmetric fingerprinting based on client side embedding. Inf Forensics Secur, IEEE Trans 9(10):1557\u20131568","journal-title":"Inf Forensics Secur, IEEE Trans"},{"issue":"2","key":"13002_CR2","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.cose.2009.08.008","volume":"29","author":"CC Chang","year":"2010","unstructured":"Chang CC, Tsai HC, Hsieh YP (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput Secur 29(2):269\u2013277","journal-title":"Comput Secur"},{"issue":"8","key":"13002_CR3","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1016\/j.patcog.2006.02.009","volume":"39","author":"T Chen","year":"2006","unstructured":"Chen T, Tsai D (2006) Owner\u2013customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recogn 39(8):1530\u20131541","journal-title":"Pattern Recogn"},{"key":"13002_CR4","doi-asserted-by":"crossref","unstructured":"Choi J, Sakurai k, Ji-Hwan P (2003) Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. Applied Cryptography and Network Security 2846. LNCS Springer, Berlin\/Heidelberg, 265-279","DOI":"10.1007\/978-3-540-45203-4_21"},{"key":"13002_CR5","volume-title":"Digital watermarking: principles & practice","author":"I Cox","year":"2001","unstructured":"Cox I, Bloom J, Miller M (2001) Digital watermarking: principles & practice. Morgan Kaufman, Burlington, MA"},{"key":"13002_CR6","first-page":"923","volume-title":"Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity","author":"M Deng","year":"2008","unstructured":"Deng M, Preneel B (2008a) Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society, Washington, DC, Guangzhou, China, pp 923\u2013929"},{"key":"13002_CR7","first-page":"524","volume-title":"On secure and anonymous buyer seller watermarking protocol","author":"M Deng","year":"2008","unstructured":"Deng M, Preneel B (2008b) On secure and anonymous buyer seller watermarking protocol. Third International Conference on Internet and Web Applications and Services, Athens, Greece, pp 524\u2013529"},{"issue":"3","key":"13002_CR8","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1007\/s11042-013-1555-0","volume":"72","author":"Z Eslami","year":"2014","unstructured":"Eslami Z, Kazemnasabhaji M, Mirehi N (2014) Proxy signatures and buyer seller watermarking protocols for the protection of multimedia content. Multimed Tools Appl 72(3):2723\u20132740","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"13002_CR9","doi-asserted-by":"publisher","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","volume":"58","author":"C Esposito","year":"2021","unstructured":"Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58(2):102468","journal-title":"Inf Process Manag"},{"issue":"3","key":"13002_CR10","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/TIFS.2007.903849","volume":"2","author":"F Frattolillo","year":"2007","unstructured":"Frattolillo F (2007) Watermarking protocol for web context. Inf Forensics Secur, IEEE Trans 2(3):350\u2013363","journal-title":"Inf Forensics Secur, IEEE Trans"},{"issue":"4","key":"13002_CR11","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1093\/comjnl\/bxu015","volume":"58","author":"F Frattolillo","year":"2015","unstructured":"Frattolillo F (2015) Watermarking protocols: problems, challenges and a possible solution. Comput J 58(4):944\u2013960","journal-title":"Comput J"},{"issue":"2","key":"13002_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2856036","volume":"10","author":"F Frattolillo","year":"2016","unstructured":"Frattolillo F (2016) A buyer-friendly and mediated watermarking protocol for web context. ACM Trans Web 10(2):9","journal-title":"ACM Trans Web"},{"key":"13002_CR13","first-page":"246","volume":"47","author":"F Frattolillo","year":"2019","unstructured":"Frattolillo F (2019) A multiparty watermarking protocol for cloud environments. J Inform Secur Appl 47:246\u2013257","journal-title":"J Inform Secur Appl"},{"issue":"7","key":"13002_CR14","first-page":"1","volume":"76","author":"J Huang","year":"2016","unstructured":"Huang J, Jeng F, Chen T (2016) A new buyer-seller watermarking protocol without multiple watermarks insertion. Multimed Tools Appl 76(7):1\u201313","journal-title":"Multimed Tools Appl"},{"key":"13002_CR15","doi-asserted-by":"crossref","unstructured":"Katzenbeisser S, Lemma A, Celik MU, van der Veen M, Maas M (2008) A buyer-seller watermarking protocol based on secure embedding. Inf Forensics Secur, IEEE Trans, 3(4):783-786","DOI":"10.1109\/TIFS.2008.2002939"},{"key":"13002_CR16","doi-asserted-by":"crossref","unstructured":"Kumar A, Tyagi V, Mohd, Dilshad, Kapil, Kumar (2011) A practical buyer seller watermarking protocol based on discrete wavelet transform. Int J Comput Appl 21(8):46-51","DOI":"10.5120\/2528-3441"},{"issue":"12","key":"13002_CR17","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"CL Lei","year":"2004","unstructured":"Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans Image Process 13(12):1618\u20131626","journal-title":"IEEE Trans Image Process"},{"key":"13002_CR18","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2016","unstructured":"Liao X, Li KD, Yin JJ (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"13002_CR19","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"ND Memon","year":"2001","unstructured":"Memon ND, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643\u2013649","journal-title":"IEEE Trans Image Process"},{"key":"13002_CR20","first-page":"1","volume":"1995","author":"N Naor","year":"1995","unstructured":"Naor N, Shamir A (1995) Visual cryptography, in: Advances in Cryptography: Eurocrypt\u201994. Springer, Berlin 1995:1\u201312","journal-title":"Springer, Berlin"},{"key":"13002_CR21","first-page":"223","volume":"1999","author":"P Paillier","year":"1999","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. in Advances in Cryptology EUROCRYPT\u201999, ser. LNCS 1592. Springer-Verlag, Berlin, Heidelberg 1999:223\u2013238","journal-title":"Springer-Verlag, Berlin, Heidelberg"},{"issue":"3","key":"13002_CR22","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L Qiao","year":"1998","unstructured":"Qiao L, Nahrstedt K (1998) Watermarking schemes and protocols for protecting rightful ownership and customer\u2019s rights. J Vis Commun Image Represent 9(3):194\u2013210","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"13002_CR23","first-page":"920","volume":"5","author":"A Rial","year":"2010","unstructured":"Rial A, Deng M, Bianchi T, Piva A, Preneel B (2010) A provably secure anonymous buyer seller watermarking protocol. Inf. Forensics Secur. IEEE Trans 5(4):920\u2013931","journal-title":"IEEE Trans"},{"key":"13002_CR24","doi-asserted-by":"crossref","unstructured":"Rial A, Balasch J, Preneel B (2011) A privacy-preserving buyer seller watermarking protocol based on priced oblivious transfer. Inf Forensics Secur, IEEE Trans 6(1): 202-12","DOI":"10.1109\/TIFS.2010.2095844"},{"issue":"1","key":"13002_CR25","first-page":"157","volume":"54","author":"HJ Wang","year":"2018","unstructured":"Wang HJ, Zhao TF, Shang DL, Wang DD (2018) Non-expanded (2, 2) visual cryptography scheme with masked image. Journal of Nanjing University (Natural Science) 54(1):157\u2013162","journal-title":"Journal of Nanjing University (Natural Science)"},{"issue":"1","key":"13002_CR26","first-page":"1","volume":"5","author":"Z Xu","year":"2012","unstructured":"Xu Z, Li L, Gao H (2012) Bandwidth efficient buyer-seller watermarking protocol. Int J Inf Comput Secur 5(1):1\u201310","journal-title":"Int J Inf Comput Secur"},{"issue":"4","key":"13002_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MNET.011.1900374","volume":"34","author":"J Yang","year":"2020","unstructured":"Yang J, Wen J, Jiang B, Wang H (2020) Blockchain-based sharing and tamper-proof framework of big data networking. IEEE Netw 34(4):62\u201367","journal-title":"IEEE Netw"},{"issue":"1","key":"13002_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/ip-ifs:20055069","volume":"153","author":"J Zhang","year":"2006","unstructured":"Zhang J, Kou W, Fan K (2006) Secure buyer-seller watermarking protocol. IEE Proc Inf Secur 153(1):15\u201318","journal-title":"IEE Proc Inf Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13002-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13002-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13002-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T09:56:40Z","timestamp":1666691800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13002-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":28,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["13002"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13002-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"30 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}