期刊文献+

Analysis and Enhancement of a Watermarking Protocol Suitable for Web Context 被引量:1

Analysis and Enhancement of a Watermarking Protocol Suitable for Web Context
原文传递
导出
摘要 A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper. <Abstract>A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期392-396,共5页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (Nos. 60970110, 60972034 and 60773086) the National Basic Research Program (973) of China(No. 2007CB311201) the Shanghai Leading Academic Discipline Project(No. B412)
关键词 copyright protection watermarking protocol privacy homomorphism copyright protection, watermarking protocol, privacy homomorphism
  • 相关文献

参考文献12

  • 1QIAO L, NAHRSTEDT K. Watermarking schemes and protocols for protecting rightful ownerships and customer's rights [J]. Journal of Visual Communication and Image Represent, 1998, 9(3): 194-210.
  • 2MEMON N, WONG P W. A buyer-seller watermarking protocol [J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.
  • 3LEI C L, Yu P L, TSAI P L, et al. An efficient and anonymous buyer-seller watermarking protocol [J]. IEEE Transactions on Image Processing, 2004, 13(12): 1618-1626.
  • 4FRATTOLILLO F. Watermarking protocol for web context [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 350-363.
  • 5KURIBAYASHI M, TANAKA H. Fingerprinting protocol for images based on additive homomorphic property [J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
  • 6RIVEST R L, SHAMIR A, ADELMAN L. A method for obtaining digital signatures and public key cryptosystems [J]. Communication of the ACM, 1978, 21(2): 120-126.
  • 7OKAMOTO T, UCHIYAMA S. A new public-key cryptosystem as secure as factoring [C]//Eurocrypt'98, LNCS. Berlin: Springer-Verlag, 1998: 308-318.
  • 8PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes [C]//Eurocrypt'99, LNCS. Berlin: Springer-Verlag, 1999: 223-238.
  • 9MAO W. Modern cryptography: Theory and practice [M]. London: Prentice Hall PTR, 2003.
  • 10STINSON D R. Cryptography: Theory and practice [M]. 2nd ed. Boca Raton: CRC Press, 2002.

同被引文献23

  • 1陈永强,胡汉平,李新天.用于数字水印鲁棒性评判的协同序参量指标[J].计算机工程与应用,2005,41(24):78-81. 被引量:2
  • 2俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 3俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:142
  • 4Merabti,Llewellyn Jones.Digital rights management in ubiquitous computing[J].Multimedia,2006,13(2):32-42.
  • 5Hernandez Martin J R,Kutter M.Information retrieval in digital watermarking[J].IEEE Communications Maga-zine,2001,39(8):110-116.
  • 6Ibrahim Nasir,Ying Weng,Jiang Jianmin,et al.Multiple spatial watermarking technique in color images[J].Sig-nal,Image and Video Processing,2010(2):145-154.
  • 7Gou Hongmei,Min Wu.Improving embedding payload in binary images with "super-pixels"[C/OL]//IEEE Interna tional Conference on Image Processing,San Antonio,TX,Sept 16-Oct 19,2007.[2013-05-23].http://ieeex plore,ieee.org/xpls/abs _ all.jsp? arnumber = 4379300.
  • 8Wu Min,Liu Bede.Data hiding in binary image for authentication and annotation[J].IEEE Transactions on Multi media,2004,6(4):528-538.
  • 9Podilehuk C I,Delp E J.Digital watermarking:algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46.
  • 10Zhang Zhiyong,Pei Qingqi,Ma Jianfeng,et al.Security and trust in digital rights management:a survey[J].Inter-national Journal of Network Security,2009,9(3):247-263.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部