Research Article

A Lightweight Buyer-Seller Watermarking Protocol

Figure 4

Identifying the malicious buyer by the seller. The seller tests the buyers with the watermark V according to (3).
905065.fig.004