Supported by National Key Basic Research Program(973 Program)of China(2014CB340600);Nature Science Foundation of Guangxi Province(2014GXNSFBA118268,2014GXNSFBA118010);Project of Guangxi Key Laboratory of Multi-source Information Mining&Security(MIMS13-06);Key Project of Yulin Normal University(2013YJZD04);Education Project of Yulin Normal University(2012SYJG30,15JSJYYB11,13YJJG30)
Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum...
Supported by the National Key Basic Research and Development Program(973 Program)(2012CB316103)
Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using...
supported by the National Natural Science Foundation of China (Grant No. 60633030);the National Basic Research Program of China (Grant No.2006CB303104)
Part Ⅲ of AVS (China Audio and Video Coding Standard) is the first generic audio standard proposed in China and is becoming popular in some applications. For MP3 audio, some effiorts have been made to solve the cop...
Supported by the National Natural Science Foundation of China (Grant Nos.90604008,60633030,60403045);Natural Science Foundation of Guangdong Province (Grant No.04009742);the National Basic Research Program of China (Grant No.2006CB303104)
Resistance to ambiguity attack is an important requirement for a secure digital rights management (DRM) system. In this paper, we revisit the non-ambiguity of a blind watermarking based on the computational indistin...
Supported by the National Natural Science Foundation ofChina (60502024);the Natural Science Foundation of Hubei Province(2005ABA267) ;the Electronic Development Fund of Ministry of Informa-tionIndustry of China and the Innovation Fundfor Technology Based Firmsof Ministry of Science and Technology of China (04C26214201284) .
In this paper a blind image watermarking that can resist to rotation, scaling and translation (RST) attacks is proposed. Based on the spread spectrum, the watermark is modulated before embedding. The logpolar mapped...
The great success of internet and the ease of copying and distributing the electronic data has presented a new challenge of how to protect the digital data. Digital watermarks have been proposed as a means for copyrig...