The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting approach to solve these problems. However, watermarks by themselves do not provide enough protection, but they must be used in certain scenarios fulfilling a number of requirements. In this paper we present the results of the application of a risk analysis technique (specifically 'attack trees' technique) to the most demanding schemes developed so far, and a new protocol or business model derived from the main conclusions of this process, which we have called SecDP (Secure Distribution Protocol). © Springer-Verlag 2004.
CITATION STYLE
Higuero, M. V., Unzilla, J. J., Jacob, E., Sáiz, P., & Luengo, D. (2004). Application of “attack trees” technique to copyright protection protocols using watermarking and definition of a new transactions protocol secdp (secure distribution protocol). Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3311, 264–275. https://doi.org/10.1007/978-3-540-30493-7_24
Mendeley helps you to discover research relevant for your work.