Research Article
A Lightweight Buyer-Seller Watermarking Protocol
Table 1
Performance comparison.
| ||||||||||||||||||||||||||||||||||||||||
:
the computation time for an asymmetric encryption. : the computation time for an asymmetric decryption. : the computation time for a modular multiplication : the computation time for generating a pair of public/private key. . : the number of DCT coefficients to be manipulated. : the size of one image element . : the size of a RSA modulus . : the size of one watermark element . |