A New Watermarking Protocol against Conspiracy  

A New Watermarking Protocol against Conspiracy

在线阅读下载全文

作  者:ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 

机构地区:[1]State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, Shaanxi, China

出  处:《Wuhan University Journal of Natural Sciences》2006年第6期1671-1674,共4页武汉大学学报(自然科学英文版)

基  金:Supported by the National Natural Science Founda-tion of China (90304008) ;the Graduate Innovation Fund of XidianUniversity (05019 , 05017);the College and University Sbject ofDoctors Specific Sientific Research Foundation of China(20040701001)

摘  要:A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

关 键 词:watermarking protocol electronic commerce security digital copyright protection conspiracy problem 

分 类 号:TP305[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象