期刊文献+

一种安全的基于数字水印买卖交易协议

A Secure Buyer-Seller Watermarking Protoclo
下载PDF
导出
摘要 提出了一种新颖的用于盗版追踪的买方卖方水印协议.在此协议中,引入的水印认证授权中心WCA,它能为买方一次生成多个数字水印,从而不需要参与买卖双方的每次数字产品交易.为了保证买方的匿名,WCA还对买方的数字证书加密,并通过买方把加密的数字证书传给卖方.此外,该水印协议还能很好地解决消费者权益、水印绑定、买方匿名、共谋、争论等问题.分析表明:提出的协议是安全有效的. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing. In the proposed proto- col, a Watermark Certification Authority (WCA) is introduced, that can produce many watermarks for a buyer at a time and is not required to participate in each transaction of digital content between the buyer and seller. In order to guarantee the anonymity of the buyer, the WCA also can encrypt the digital certificate of buyer and hand over the encrypted message to seller via the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the digital conspiracy problem, the dispute problem. The analyses indicate that the proposedprotocol is secure and practical.
作者 胡玉平
出处 《微电子学与计算机》 CSCD 北大核心 2009年第6期9-11,16,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60873198) 湖南省教育厅重点资助科研项目(06A031) 湖南省自然科学基金项目(06JJ5098)
关键词 数字水印 安全 水印协议 digital watermarking secure watermarking protocol
  • 相关文献

参考文献8

  • 1胡玉平.基于神经网格的奇异值分解域公开水印算法[J].微电子学与计算机,2008,25(2):1-4. 被引量:3
  • 2Cheung Shingchi, Leung Hofung, Wang Changjie. A commutative encrypted protocol for the privacy protection of watermarks in digital contents [ J ]// Proceedings of the 37th Annual Hawaii International Conference on System Sciencesm. Hawaii, 2004(1) :94 - 103.
  • 3Zhang J, Kou W, Fan K. Secure buyer- seller watermarking protocol[J]. IEE Proceedings of information Security, 2006,153(3) : 15 - 18.
  • 4Qiao L, Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customer' s fights[J]. Visual comm and image representation, 1998, 23(9) : 194 -210.
  • 5Memon N, Wong P W. A buyer- seller watermarking protocol [ J ]. IEEE Transactions on Image Processing.2001,10(4):643 -649.
  • 6Lei L, Yu P L, Tsai P L, et al. An efficientand and anonymous buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2004,32(16) : 1618 - 1626.
  • 7Ju H S, Kim H J, Lee D H, et al. An anonymous buyerseller watermarking protocol with anonymity control[J ]. ICISC 2002, LNCS 2587:421 -432.
  • 8Fan Chuni, Chen Mingte, Sun Weizhe. Buyer- seller watermarking protocols with off-line trusted parties[C]// MUE ' 07. International Conference on Multimedia and Ubiquitous Engineering. Secul: Kaoksiurg, 2007 (4) : 1035 - 1040.

二级参考文献8

  • 1陈永强,胡汉平,李新天.基于协同神经网络的图像数字水印算法[J].中国图象图形学报,2005,10(7):894-899. 被引量:5
  • 2李旭东,张振跃.利用矩阵范数实现的公开水印技术[J].计算机辅助设计与图形学学报,2005,17(8):1857-1861. 被引量:17
  • 3IngemarJCox MatthewLMiller JeffreyABloom.数字水印[M].北京:电子工业出版社,2003.27-55.
  • 4Davis K J, Najarian K. Maximizing strength of digital watermarks using neural networks [ C]. International Joint Conference on Neural Networks V4. Washington, DC, USA, 2001 : 2893 - 2898.
  • 5Wang Hungjen, Chang Chuanyu, Pan Shengwen. A DWTbased robust watermarking scheme with fuzzy ART [ C].International Joint Conference on Neural Networks. London, England, 2006 : 1750 - 1757.
  • 6Chang Chinchen, Tsai Piyu, Lin Chiachen. SVD-based digital image watermarking scheme[J ]. Pattern Recognition Letters,2005(26) : 1577 - 1586.
  • 7Bas P, Chassery J M, Macq B. Image watermarking: an evolution to content approaches [J ]. Pattern recognition, 2002(35) :545 - 561.
  • 8刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171. 被引量:217

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部