期刊文献+

公开可验证的零知识水印检测 被引量:5

Publicly Verifiable Zero-Knowledge Watermark Detection
下载PDF
导出
摘要 对称水印方案的水印检测密钥可以被用来伪造和移去水印,因此要求它在检测过程中也是保密的.零知识的水印检测方案利用密码学中零知识和知识证明的思想和算法,实现在水印检测时使得验证者确信水印存在性的同时又不泄漏水印检测密钥.提出了公开可验证的零知识水印检测的安全需求,给出一个公开可验证的承诺方案和一个证明知道被承诺值的离散对数的零知识知识证明协议.在此基础上提出了一个公开可验证的零知识水印方案,并讨论了它的安全性. As the detection key in symmetric watermarking scheme can be used to forge or remove watermarks from digital works, it is required that the detection key be secret in watermark detection procedures. Based on zero-knowledge and proof of knowledge concepts and protocols in Cryptology, zero-knowledge watermark detection protocols can make the verifier believe the presence of a watermark in a disputed digital work while not compromising the detection key. The security requirements of a publicly verifiable zero-knowledge watermark detection scheme are outlined in this paper. Then a publicly verifiable commitment scheme and a zero-knowledge proof of knowledge protocol which proves knowing the discrete logarithm of a committed value are presented. Finally, using the above scheme and protocol as building blocks, a publicly verifiable zero-knowledge watermark detection protocol is proposed and its security considerations are addressed.
出处 《软件学报》 EI CSCD 北大核心 2005年第9期1606-1616,共11页 Journal of Software
基金 国家自然科学基金 国家高技术研究发展计划(863)~~
关键词 数字水印 零知识 公开可验证 digital watermark zero-knowledge publicly verifiable
  • 相关文献

参考文献20

  • 1Kalkcr T, Linnartz YP, Dijk MV. Watermark estimation through detector analysis. In: Proc of the IEEE Int'l Conf. on Image Processing (ICIP'98). Los Alamitos: IEEE Computer Society Press, 1998.425-429.
  • 2Kinoshita H. An image digital signature system with zkip for the graph isomorphism problem In: Proc. of the IEEE Conf, on Image Processing (ICIP'96), Vol 3. Los Alamitos: IEEE Computer Society Press, 1996. 247-250.
  • 3Gopalakrishnan K, Memon N, Vora P. Protocols for watermark verification: Multimedia and security. IEEE Multimedia, 2001,8(4):66-70.
  • 4Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing,1997,6(12): 1673-1687.
  • 5Craver S. Zero knowledge watermark deteetion. In: Information Hiding: The 3rd Int'l Workshop. LNCS 1768, Berlin:Springer-Verlag, 2000. 101-116.
  • 6Adelsbach A, Katzenbeisser S, Sadeghi AR. Watermark detection with zero-knowledge disclosure. ACM Multimedia Systems Journal, 2003,9(3):266-278.
  • 7Adelsbach A, Katzenbeisser S, Sadeghi AR. Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure. In: Proc. of the European Signal Processing Conf. (EUSIPCO 2002). 2002. 446-449.
  • 8Adelsbach A, Sadeghi R. Zero knowledge watermark detection and proof of ownership. In: Information Hiding: The 4th Int'l Workshop. LNCS 2137, Berlin: Springer Verlag, 2001. 273-287.
  • 9邹萧湘 戴琼 黄晁 李锦涛.零知识水印验证协议.软件学报,2003,14(9):1645—1651[J].http://www.jos.org.cn/1000.9825/14/1645.pdf,:.
  • 10Craver S, Memon N, Yeo BL, Yeung MM. Resolving rightful ownerships with invisible watermarking techniques: Limitations,attacks, and implications. IEEE Journal on Selected Area in Communications, 1998,16(4):573-586.

同被引文献30

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2秦波,秦慧,王尚平,王育民.一种保护标价安全的电子拍卖方案[J].计算机研究与发展,2006,43(1):28-32. 被引量:6
  • 3Kalker T,Linnartz J P, Dijk M V. Watermark estimation through detector analysis [ C ]//Proc of the IEEE Int'l Confon Image Processing ( ICIP' 98 ) . Los Alamitos: IEEE Computer Society Press, 1998: 425 -429.
  • 4Kinoshita H. An image digital signature system with ZKIP for the graph isomorphism Problem [ C]//Proc of the IEEE Conf on Image Processing( ICIP' 96 ). Los Alamitos: IEEE Computer Society Press, 1996,3:247-250.
  • 5Adelsbach A, Katzenbeisser S, Sadeghi A. Watermark detection with zero-knowledge disclosure [ J ]. Multimedia Systems Journal, 2003,9 (3) :266-278.
  • 6Cox I,Kilian J,Leighton T, et al. Secure spread spectrum watermarking for multimedia[ J]. IEEE Transactions on Image Processing, 1997, 6(12) :1673-1687.
  • 7Bruce Schneier. Applied cryptography: protocols, algorithms, and source code in C[M]∥吴世忠,祝世雄,张文政,译.应用密码学:协议、算法与C源程序.北京:机械工业出版社,2000-01:71-78,334-340.
  • 8Myriam J J, Muriel, Quisquater M. How to explain zero-knowledge protocols to your children [ C ]//Proceedings of Advances in Cryptology- CRYPTO ' 89. [ S. l. ]:Springer-Verlag, 1990:628-631.
  • 9Craver S,Memon N,Yeo B L,et al. Resolving rightful ownerships with invisible watermarking techniques:limitations, attacks and implications[ J]. IEEE Journal on Selected Area in Communications, 1998, 16(4) :573-586.
  • 10K Hirotsugu, An image digital signature system with ZKIP for the graph isomorphism problem [C]. The 3rd IEEE Conf on Image Processing, Piscataway, NJ, 1996.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部