The Proposed Scheme

Identification and Dispute Resolution (1)
 

New Algorithm Requirement

Watermarking Generation Protocol

Subprotocol

Watermarking (1)
Watermarking (2)

Watermarking (3)

Identification and Dispute Resolution (1)
Matching Up the Sale Record
Identification and Dispute Resolution (2)
Security Requirements for the seller
Security Requirements for the buyer
Degree of Anonymity


           

            那我們來看一下,我們的protocol,如果說發現 unauthorized copy 我們怎麼處理。假設我在市面

上發現一個非法的,我認為非法的copy,說是Y好了,那我可以用 watermark extraction key 去把裡面

transaction ID 抓出來,叫做V’,假設我們叫V’好了,我就從Y裡面把他的 transaction ID,因為

transaction ID 是怎麼加進去的?事實上這個 seller 當然他知道嘛,所以他可以把 transaction ID 抓出來。