Dragon Worship and Cultural Implication in the Form Design of Ten-stringed Qin in Zenghou Yi Tomb in the Pre-Qin Dynasty

  • Kenan Yao

Abstract

In asymmetric fingerprinting, the merchant can trace the traitors from a pirated copy by means of the embedded unique fingerprint, while the customer is immune of being framed due to the asymmetric property. In this letter, we propose an asymmetric fingerprinting scheme based on 1-out-of-n oblivious transfer, which is efficient from the bandwidth usage point of view. First, multicast that is an efficient transport technology for one-to-many communication is exploited, which can reduce the bandwidth usage significantly. Second, symmetric encryption instead of public-key encryption is performed on the multimedia content, which can reduce the complexity and communication cost.

Published
2019-07-24