期刊文献+

一种有效的买方卖方数字水印协议 被引量:2

An Effective Buyer-Seller Digital Watermarking Protocol
原文传递
导出
摘要 数字水印技术是保护数字产品知识产权的一个潜在解决方案,一个有效的数字水印方案必须能够解决版权保护和盗版追踪等相关问题。以前提出了很多著名的协议,大多都存在着缺陷。在Leietal.协议的基础上提出了一种有效的数字水印协议。该协议基于密钥共享和同态公钥密码体制的思想,有效地解决了消费者的权益保护、未绑定、盗版追踪等问题,并引进一个可信的认证中心CA,有效解决了共谋问题和买方参与纠纷解决问题。 Digital watermarking is a potential solution to protecting intellectual property rights of digital products.An effective digital watermarking solution must be able to tackle the copyright protection,piracy trace,and other related problems.Several famous digital protocols are presented,and their deficiencies are pointed out.Based on the protocol proposed by LEI et al.,an effective buyer-seller watermarking protocol is proposed,which,with the idea of secret sharing and homomorphic public key cryptosystem,effectively solves the problem of customer's right-and-interest protection.The unbinding problem,the piracy tracing problem effectively.And with the introduction of trusted certification authority(CA),the conspiracy problem and the problem of buyer's participation in the dispute resolution could be solved effectively.
作者 王少霞 方勇
出处 《通信技术》 2010年第7期118-120,共3页 Communications Technology
关键词 水印协议 版权保护 秘密共享 watermarking protocol copyright protection secret sharing
  • 相关文献

参考文献8

  • 1顾宁,葛万成.基于DWT域图像数字水印技术[J].通信技术,2009,42(5):213-214. 被引量:8
  • 2QIAO L,NAHPSTEDLT K.Watermarking Schemes and Protocols for Protecting Rightful Ownerships and Customer's Rights[J].Visual Communication and Image Representation,1998,9(03):194-210.
  • 3MEMON N,WONG P W.A Buyer-Seller Watermarking Protocol[J].IEEE Trans on Image Processing,2001,10(04):643-649.
  • 4LEI C L,YU P L,TSA I P L,et al.An Efficient and Anonymous Buyer-seller Watermarking Protocol[J].IEEE Transactions on Image Processing,2004,13(12):1618-1626.
  • 5CHANG Chinchen.CHANG Chiyien.An Enhanced Buyer Seller Watermarking Protocol[J].Proceeding of,ICCT,2003,2(12):1779-1783.
  • 6ZHANG J,KOU W,FAN K.Secure Buyer-seller Watermarking Protocol[J].IEE Proceedings Information Security,2006,153(01):15-18.
  • 7朱香卫,肖亮,吴慧中.密码学技术与数字水印技术比较[J].通信技术,2008,41(7):208-210. 被引量:7
  • 8王淑玉,叶晓丽,李建华.基于Paillier公钥密码体制的非对称叛逆者追踪[J].河南科学,2008,26(8):977-979. 被引量:1

二级参考文献17

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2Voyatzis G, Pitas I. The Use of Watermarks in the Protection of Digital Multimedia Products [J]. Proceedings of the IEEE, 1999, 87 (07) : 1197-1207.
  • 3Lin Ching-Yung, Wu Min, Bloom J A, et al. Rotation, Scale, and Translation Resilient Watermarking for Images[J].IEEE Transactions on Image Processing, 2001, 10 (5) :767-782.
  • 4Kaewkamnerd N, Rao K R. Wavelet Based Image Adaptive Watermarking Scheme[J]. Electronics Letters, 2000, 36 (4) :312-315.
  • 5Lumint Alessandra, Maio Dario. Blind Watermarking System for Digital Images in the Wavelet Domain[J]. Proceedings of SPIE, 2000 (4) :524-535.
  • 6Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter. Denoising and Copy Attacks Resilient Watermarking by Exploiting Prior Knowledge at Detector[J].IEEE Transactions on Image Processing, 2002,11 (3) :280-292.
  • 7王颖 黄志蓓.数字水印[M].北京:电子工业出版社,2003..
  • 8Chor B, Fiat A, Naor M. Tracing traitors [C]//Advances in Cryptology. Proc of CRYPTO' 94, LNCS, Berlin: Springer-Verlag, 1994, 839- 257-270.
  • 9Boneh D, Franklin F. An efficient public key traitor tracing scheme [C]// Advances in Cryptology. CRYPTO'99, Berlin: Springer- verlag, 1999, 1666: 338-353.
  • 10Yohida M, Fujiwara T. A subscriber unauthorizable and traitor traceable broadcast distribution system [C]//Proc of SCIS 2000, Okinawa: Springer-Verlag, 2000: 245-258,

共引文献13

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部