期刊文献+

可证安全的数字水印方案 被引量:3

Provable secure digital watermarking scheme
在线阅读 下载PDF
导出
摘要 应用水印、密码学和编码技术,提出了一个可证安全的数字水印方案,包括嵌入水印方案和提取验证水印方案。方案中水印包含了身份标识(ID)、作品描述和水印密钥,便于认证和身份鉴别,方案具有较高的安全性可以抵抗目前所有的水印协议攻击,并用RO模型证明其安全性,特别是提供了独特的验证纠正恢复能力,具有很好的性能。 A novel provable security watermarking scheme was presented by adopting the digital watermarking technology, cryptology and encode method, it comprises embedding watermarks scheme and detecting watermarks scheme. The participant ID, Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme, so that the watermarks can be used to authenticate lawful user and judge the ownership. The scheme has rigorously security almost against all watermarks protocol attacks. Especially, it has correct ability, as so as higher efficiency.
作者 袁征
出处 《通信学报》 EI CSCD 北大核心 2008年第9期91-96,共6页 Journal on Communications
基金 国家重点基础研究发展计划(“973”计划)基金资助项目(2007CB807902,2007CB807903) 中国博士后科学基金资助项目(20080430423) 北京电子科技学院工程课题(06五系JAVA) 北京市高等学校教育改革立项项目《加强密码学课程体系改革,培养信息安全专门人才》(2004)~~
关键词 数字作品版权保护 水印方案 水印协议攻击 可证安全性 RO模型 DRM watermarking scheme watermarking protocol attack provable security RO mode
  • 相关文献

参考文献15

  • 1LIU Q, NAINI R S, SHEPPARD N P. Digital rights management for content distribution[A]. Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003 (AISW2003)[C]. 2003.49-58.
  • 2LINE T, ESKICIOGLU A M, LAGENDIJK R L, et al. Advances in digital video content protection[J]. Proceedings of the IEEE, 2005, 93(1): 171-183.
  • 3KATZENBEISSER S, VEITH H. Securing symmelric watermarking schemes against protocol attacks[A]. Proceedings of the SPIE vol. 4675, Security and Watermarking of Multimedia Contents IV[C]. 2002. 260-268.
  • 4刘立刚,陈晓苏,胡蕾.抗协议攻击的数字版权保护安全方案[J].中山大学学报(自然科学版),2004,43(A02):83-86. 被引量:6
  • 5张雨,肖扬.基于Turbo码的数字水印方案.[EB/OL].http://www.paper.edu.cn.
  • 6TZENG J G, HWANG W L, CHERN I L. An asymmetric subspace watermarking method for copyright protection[J]. IEEE Transactions on Signal Processing,2005,53(2):784-792.
  • 7ADELSBACH A, KATZENBEISSER S, VEITH H. Watermarking schemes provably secure against copy and ambiguity attacks[A]. ACM Workshop on Digital Rights Management(DRM'03)[C]. Washington: ACM Press, 2003. 111-119.
  • 8CELIK M U, SHARMA G, TEKALP A M. Collusion-resilient fingerprinting by random pre-warping[J]. IEEE Signal Processing Letters, 2004, 11(10): 837-865.
  • 9YOO H, LEE H, LEE S, et al. Designated verification of non-invertible watermark[A]. ISC'03[C]. LNCS 2851, Berlin, Heidelberg: Springer- Verlag, 2003.338-351.
  • 10SEKHAR M R, OKAMOTO T, OKAMOTO E. On designatedly verified (non-interactive) watermarking schemes[EB/OL], http://eprint. iacr.org/, 2005.

二级参考文献4

  • 1KUTTERM,,VOLOSHYNOVSKIYS,HERRIGELA.Thewatermarkcopyattack[].SecurityandWatermarkingofMultimediaContentsⅡProceedingsoftheSPIE.2000
  • 2CRAVERS,KATZENBEISSERS.Copyrightprotectionprotocolsbasedonasymmetricwatermarking:theticketconcept[].CommunicationsandMultimediaSecurityIssuesoftheNewCentury.2001
  • 3KATZENBEISSERS,VEITHH.Securingsymmetricwatermarkingschemesagainstprotocolattacks[].SecurityandWatermarkingofMultimediaContentsⅣProceedingsoftheSPIE.2002
  • 4ADEKSBACHA,KATZENBEISSERS,SADEGHIAR.Ontheinsecurityofnon_invertiblewatermarkingschemesfordisputeresolving[].InternationalWorkshoponDigitalWatermarking(IWDW).2004

共引文献5

同被引文献26

  • 1唐明,王丽娜,张焕国.动态多重数字水印设计方案[J].计算机应用研究,2006,23(3):28-30. 被引量:7
  • 2张雨,肖扬.基于Turbo码的数字水印方案[J].计算机与数字工程,2006,34(3):28-31. 被引量:2
  • 3赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950. 被引量:46
  • 4陈传波,祝中涛.RSA算法应用及实现细节[J].计算机工程与科学,2006,28(9):13-14. 被引量:27
  • 5王炳.信息隐藏技术[M].北京:国防工业出版社,2007.
  • 6FrCdCric Lefkbvre.A print and scan optimized watermarking scheme[J].In:Proc IEEE Fourth Workshop on Multimedia Signal Processing,2001:511-516.
  • 7X.Zhang,K.Li.Comments on an SVD-based watermarking scheme for protecting rightful ownership[J].IEEE Trans.Multimedia.2005,7(3):593-594.
  • 8Ahmad A.Mohammad,Ali Alhaj,Sameer Shaltaf.An improved SVD-based watermarking scheme for protecting rightful ownership[J].Signal Processing 88(2008)2158-2180.
  • 9Ming-Quan Fan,Hong-Xia Wang,Sheng-Kun Li.Restudy on SVD-based Watermarking Scheme[J].Appl.Math.Comput.(2008),doi:10.1016/j.amc.2008.05.003.
  • 10Chun-Shien Lu,Chao-Yung Hsu.Near-Optimal Watermark Estimation and Its Countermeasure:Antidisclosure Watermark for Multiple Watermark Embedding[J].IEEE Transactions On Circuits and Systems for Video Technology,2007,17(4):454-467.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部