For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techni...For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol.展开更多
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)...A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's sch...A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.展开更多
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol.
基金Supported by the National Natural Science Founda-tion of China (90304008) the Graduate Innovation Fund of XidianUniversity (05019 , 05017)the College and University Sbject ofDoctors Specific Sientific Research Foundation of China(20040701001)
文摘A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金the National Natural Science Foundation of China (Nos. 60970110, 60972034 and 60773086)the National Basic Research Program (973) of China(No. 2007CB311201) the Shanghai Leading Academic Discipline Project(No. B412)
文摘A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.