录音设备的普及,使重录音成为一种去除音频信号中嵌入水印的普遍攻击方式。为抵抗重录音攻击提出一种新的用于溯源追踪的鲁棒音频水印算法,给出系数对数均值(Logarithmic Mean of Coefficient,LMC)的定义,分析系数对数均值的性质。提出...录音设备的普及,使重录音成为一种去除音频信号中嵌入水印的普遍攻击方式。为抵抗重录音攻击提出一种新的用于溯源追踪的鲁棒音频水印算法,给出系数对数均值(Logarithmic Mean of Coefficient,LMC)的定义,分析系数对数均值的性质。提出基于DCT的中频域水印嵌入方法。同步信息由帧号生成,和由版权生成的水印信息一起嵌入到载体信号中。仿真实验结果表明,提出的算法具有较好的不可听性、鲁棒性,同时能够有效抵抗一定程度的重录音攻击。展开更多
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons...A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.展开更多
Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using...Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets.展开更多
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa...This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.展开更多
文摘录音设备的普及,使重录音成为一种去除音频信号中嵌入水印的普遍攻击方式。为抵抗重录音攻击提出一种新的用于溯源追踪的鲁棒音频水印算法,给出系数对数均值(Logarithmic Mean of Coefficient,LMC)的定义,分析系数对数均值的性质。提出基于DCT的中频域水印嵌入方法。同步信息由帧号生成,和由版权生成的水印信息一起嵌入到载体信号中。仿真实验结果表明,提出的算法具有较好的不可听性、鲁棒性,同时能够有效抵抗一定程度的重录音攻击。
文摘A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.
基金Supported by the National Key Basic Research and Development Program(973 Program)(2012CB316103)
文摘Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets.
文摘This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.