期刊文献+

非对称数字水印系统研究 被引量:3

Research on asymmetric digital watermarking system
下载PDF
导出
摘要 针对传统对称水印的不足,设计并实现了一种用于版权保护的非对称图像水印系统。该系统采用三级认证结构:用户和认证机构分别拥有由私钥变换而成的不同的公钥,他们可以利用各自的公钥对数字产品进行两层检测,并且无法去除和伪造水印,只有掌握私钥的版权所有者才能进行最终的认证。实验表明:该水印的检测性能良好,同时对常规的图像处理方法具有较强的顽健性。与其它非对称水印相比,该水印系统不但抵御公开攻击的能力较强,而且可防止认证机构的欺骗行为,因而具有更高的安全性。 Aiming at the limitations of traditional symmetric watermarking, an asymmetric image watermarking system that offers three-level authentication for copyright protection was described. In the proposed system, the two watermarks could be publicly detected by users and third trusted party respectively, but they couldnot be forged and removed. The final authentication could be implemented by only data owner knowing the private key. The experimental results showed that the watermark has perfect detection performance and robustness against the common image processing techniques. Compared with recent asymmetric watermarking schemes, the proposed system provides a higher security level against malicious attacks, including attack on the public detector and fraudulent act of trusted third party.
出处 《通信学报》 EI CSCD 北大核心 2005年第8期28-35,共8页 Journal on Communications
基金 湖南省教育厅资助科研项目(03B033) 国防科工委预研项目(15-8-4)
关键词 数字水印 非对称水印 小波变换 公开攻击 digital watermarking asymmetric watermark wavelet transform public attack
  • 相关文献

参考文献10

  • 1COX I J, MILLER M L, BLOOM J A. Watermarking applications and their properties[A]. International ConferencE on Information Technology[C]. Lasvegas, 2000. 147-196.
  • 2HARTUNG F, GIROD B. Fast public-key watermarking of compressed video[A]. Proceedings of the IEEE International Conference on Image Processing[C]. Santa Barbara, 1997.528-531.
  • 3FURON T, DUHAMEL P. An asymmetric public detection watermarking technique[A]. Workshop on Information Hiding[C].Dresden, 1999.
  • 4VAN SCHYNDEL R G, TIRKEL A Z, SVALBE I D. Key independent watermark detection[A]. Proceedings of the IEEE International Conference on Multimedia Computing and Systems[C]. Florence, 1999. 580-585.
  • 5EGGERS J J, SU J K, GIROD B. Public key watermarking by eigenvectors of linear transforms[A]. Proceedings of European Signal Processing Conference[C]. Tampere, 2000.
  • 6EGGERS J J, SU J K, GIROD B. Asymmetric watermarking schemes[A]. Sicherheit in Mediendaten, GMD Jahrestagung[C].Springer Verlag, 2000.
  • 7PICARD J, ROBERT A. Neural Networks Functions for Public Key Watermarking, LNCS2137[S]. 2001. 142-156.
  • 8CHOI H, LEE K, KIM T. Transformed-key asymmetric watermarking system[J]. IEEE Signal Processing Letters, 2004,11 (2): 251-254.
  • 9BIRYUKOV A, CANNIERE C D, et al. A toolbox for cryptanalysis: linear and affine equivalence algorithms[A].Proceedings of Eurocrypt'2003[C]. LNCS2656, 2003.33-50.
  • 10CRAVER S, KATZENBEISSER S. Copyright protection protocols based on asymmetric watermark: the ticket concept[A].Proceedings of the Sixth Conference on Communication and Multimedia Security[C]. German, 2001. 159-170.

同被引文献14

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部