Research Article

A Lightweight Buyer-Seller Watermarking Protocol

Figure 5

Identifying the malicious buyer by the WCA. The WCA traces the traitor with the watermark W according to (4).
905065.fig.005