期刊文献+

一类基于主从代理的应用层多播水印协议的设计与分析 被引量:1

Design and analysis of a multicast watermarking protocol for proxy-based application layer multicast
原文传递
导出
摘要 在应用层多播的框架之下结合已有多播水印协议的特点,提出一个适用于应用层多播的多播水印协议PALMWP.PALMWP协议属于位置相关协议,有着此类协议的优点,如部署简单、扩展性较好等.在协议设计中,加进了LDPC码等设计要素,使它在版权保护、盗版源跟踪及泄密者识别方面能发挥较好的作用.最后使用BAN逻辑对协议的认证环节进行了演绎分析. A multicast watermarking protocol(PALMWP), based on application layer multicast is presented. The protocol is location dependent protocol, so it has the same advantages as other location dependent protocol, such as easier deployment, better scalability. Furthermore, LDPC code is used as a design element to enhance the capability of copyright protection, traitor tracing and leaker identification. Finally, BAN logic is used to deduct the authentication part of the PALMWP.
作者 陆正福 王涛
出处 《云南大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第3期234-240,共7页 Journal of Yunnan University(Natural Sciences Edition)
基金 国家自然科学基金资助项目(10561009) 云南大学中青年骨干教师培养计划专项经费资助项目 云南大学理(工)科校级科研重点项目(2003Z010C)
关键词 应用层多播安全 LDPC码 多播水印协议 数字水印 数字指纹 application layer muhicast security LDPC muhicast watermarking protocol digital watermarking digital fingerprintin
  • 相关文献

参考文献8

二级参考文献65

  • 1陆正福,叶锐,王国栋.基于移动代理的多播水印协议[J].云南大学学报(自然科学版),2004,26(4):306-311. 被引量:7
  • 2[3]JUDGE P,AMMAR M.WHIM:Water-marking multicast video with a hierarchy of inter-mediaries[J].Computer Networks:The International Journal of Computer and Telecommunications Networking,2002,39(6):699-712.
  • 3[4]BROWN I,PERKINS C,CROWCROFT J.Watercasting:distributed watermarking of multicast media[A].Proceedings of the First International Workshop on Networked Group Communication[C].Berlin:Springer-Verlag,1999.286-300.
  • 4[5]CHU Hao-hua,QIAO Lin-tian,NAHRSTEDT K.A secure multicast protocol with copyright protection[A].Proceedings of the IS&T/SPIE Conference on Security and Watermarking of Multicast Contents[C].Calif San Jose Jan,1999.460-471.
  • 5[6]PARVIAINEN R,PARNES P.Large scale distributed watermarking of multicast media through encryption.Communications and Multimedia Security[EB/OL].http://citeseer.nj.nec.com/447585.html,2003-09-20.
  • 6[7]MITCHELL D S,AHMED H T.Multimedia data-embedding and watermarking technologies[J].Proceedings of the IEEE,1998,86(6):1064-1087.
  • 7[8]WAGNER N R.Fingerprinting.Symposium on Security and Privacy,IEEE[EB/OL].http://citeseer.nj.nec.com/447585.html,2003-09-20.
  • 8[9]BONEH D,SHAW J.Collusion-secure finger-printing for digital data[A].Crypto'95,LNCS 963[C].Berlin:Springer-Verlag,1995.452-465.
  • 9[11]FRITZ H.Time-limited blackbox security:protecting mobile agents from malicious Hosts[A].Mobile Agent Security,LNCS,1419[C].Berlin:Springer-Verlag,1996.92-113.
  • 10JUDGE P, AMMAR M. WHIM: Watermarking multicast video with a hierarchy of intermediaries[J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2002, 39 (6) :699-712.

共引文献50

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部