期刊文献+

非对称数字水印技术研究 被引量:15

Research on Asymmetric Watermark
下载PDF
导出
摘要 在数字产品中嵌入数字水印,是对其进行版权保护的一种有力的手段。近年来提出了不少数字水印方案,但是它们中大部分都是对称的,即用于水印嵌入和水印检测的密钥是相同的。而许多实际的应用都要求非对称的数字水印方案,即水印嵌入时使用私人密钥,水印检测时只需要一个公开密钥。文章分析了非对称水印的基本特征,并对一些非对称方案,包括非对称水印算法和非对称水印协议进行了讨论。 Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data.Many different schemes have been proposed in the last few years,but most of them are symmetric,i.e.,the key used for watermarking embedding is just the same used for watermarking detection.However,in many applications it needs an asymmetric scheme ,where a private key is used for watermark embedding,and a public key is used for wa-termark detection.This paper discusses some basic characters of asymmetric watermark,and review some asymmetric wa-termarking algorithms and asymmetric watermarking protocols.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第16期7-10,54,共5页 Computer Engineering and Applications
基金 中科院计算所创新课题资助(题号:20016070(L)) 领域前沿青年基金资助(题号:20016280-15)
关键词 非对称数字水印 版权保护 公开密钥 离散傅立叶变换 symmetric watermark,asymmetric watermark,public key,private key
  • 相关文献

参考文献15

  • 1[1]Joachim J Eggers,Jonathan K Su,Bernd Girod. Asymmetric watermarking schemes,Sicherheit in Mediendaten.GMD Jahrestagung,Proceedings ,Springer Verlag, 2000
  • 2[2]Scott Craver,Stefan Katzenbeisser. Copyright protection protocols based on asymmetric watermark:the ticket concept[C].In:Proceedings of the Sixth Conference on Communication and Multimedia Security(CMS'01),German ,2001: 159~170
  • 3[3]Bruce Schneier. Applied Cryptograpy: Protocols, Algorithms,and Source Code in C[M].2nd ed,New York:John Wiley and Sons,1996
  • 4[4]Frank Hartung,Bernd Girod.Copyright protection in video delivery networks by watermarking of pre-compressed video[C].In :2nd European Conference on Multimedia Applications,Services and Techniques (ECMAST'97), Milan, Italy, Lecture Notes in Computer Science,1997; 1242:423~436
  • 5[5]Frank Hartung,Bernd Girod. Watermarking of uncompressed and compressed video[J].Signal Processing,Special issue on copyright protection and access control for multimedia services, 1998 ;66(3):283~301
  • 6[6]Frank Hartung,Bernd Girod.Fast public-key watermarking of compressed video[C].In:Proceedings of the IEEE International Conference on Image Processing(ICIP97),Santa Barbara,CA,USA,1997;1:528~531
  • 7[7]R G van Schyndel,A Z Tirkel,I D Svalbe. Key independent watermark detection[C].In:IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999; 1: 580~585
  • 8[8]Joachim J Eggers,Jonathan K Su,Bernd Girod. Public key watermarking by eigenvectors of linear transforms[C].In :European Signal Processing Conference( EUSIPCO'2000 ) , Tampere,Finland,2000
  • 9[9]Joachim J Eggers,Bernd Girod. Robustness of public key watermarking schemes[C].In:V3D2 Watermarking Workshop,Erlangen,Germany,1999
  • 10[10]T Furon,P Duhamel.An asymmetric public detection watermarking technique[C].In:Workshop on Information Hiding,Dresden,Germany,1999

同被引文献60

引证文献15

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部