期刊文献+

数字水印中的解释攻击及其解决方案 被引量:5

Interpretation Attacks and Its Resolution
在线阅读 下载PDF
导出
摘要 数字水印主要用于数字作品的版权保护。解释攻击是数字水印攻击的主要手段之一.详细介绍了如何利用时戳机制、公证机制、单向水印机制来对抗解释攻击,以及各种解决方案优劣特性。并在此基础上,提出了一种能够较好抵抗解释攻击的数字水印模型.该模型能够避免由于解释攻击引起的无法仲裁的版权纠纷的出现,并允许版权所有者在一个比较宽松的环境下为作品添加水印。 The main purpose of digital watermark is copyright protection of digital work. Interpretation attack is one of the main attack methods for digital watermark In this article, we present how to use timestamp mechanism, notarization mechanism and one way watermarking mechanism against interpretation attack. After trying to study the essential characteristic of interpretation attack and comparing the advantage and disadvantage of each resolution, we propose a watermark embed scheme against interpretation attacks. This model will avoid the copyright disputes from interpretation and allow an author embed the watermark for his works in a free environment.
作者 尹萍 刘振华
出处 《计算机应用研究》 CSCD 北大核心 2001年第4期12-15,共4页 Application Research of Computers
基金 国家自然科学基金资助项目!(69873041) "九七三"资助项目!(G1999035805)
关键词 数字水印 水印攻击 解释攻击 网络安全 计算机网络 版权保护 Digital watermark Attack on watermark Interpretation attack Timestamp Notarization Invertible watermark One-way watermark
  • 相关文献

参考文献5

  • 1[1]Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Information Hiding-A Survey[J]. Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999, 87(7): 1062-1078.
  • 2[2]Ross J Anderson, Fabien A P Petitcolas. On the Limits of Steganography[J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 474-481.
  • 3[3]David Aucsmith. Attacks on Copyright Marking Systems[J]. Second Workshop on Information Hiding, in vol.1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 April, 1998, 218-238.
  • 4[4]Scott Craver, Nasir Memon, Boon-Lock Yeo, Minerva M Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications[J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 573-586.
  • 5[5]Bruce Schneier. Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C[M]. Hohn Wiley & Sons, Inc., 1996.

同被引文献29

  • 1郑爱彬,张明.一种基于特征点的双数字水印方案[J].南京师范大学学报(工程技术版),2005,5(1):50-52. 被引量:2
  • 2李庆诚,窦毅.数字水印的解释攻击与关联性特征[J].计算机应用研究,2005,22(5):115-117. 被引量:7
  • 3罗永,毛紫阳,成礼智,吴翊.多重水印技术的模糊关系与应用[J].模糊系统与数学,2006,20(1):147-153. 被引量:1
  • 4李雷达,郭宝龙.一种新的多重水印算法(英文)[J].光电工程,2007,34(2):74-78. 被引量:3
  • 5Schneier B.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2001.
  • 6[1]Alexander herrigel , Sviatoslav voloshynovskiy , Yuriy rystar."The watermark template attack"[J].Proceedings of the SPIE Security and Watermarking of Multimedia Contents III , vol. 4314 ,394-405 , San Jose,January 22-25 , 2001.
  • 7[2]Reka Major , Valentin Deac , Monica Borda."An application of the hash functions in digital watermarking"[J].《 http://193.226.6.174/IT2002/pdf/L16.pdf 》
  • 8[3]A.Nikolaidis , S.Tsekeridou , A.Tefas , V.Solachidis."A survey on watermarking application scenarios and related attacks"[J].Image Processing , 2001, Proceedings. 2001.
  • 9[4]Karen su , Eeepa Kundur and Dimitrios Hatzinakos."A Novel Approach to Collusion-resistant Video Watermarking "[J].《 http://ee.tamu.edu/~deepa/pdf/4675-53.pdf 》.
  • 10[5]M.kutter , F.A.peticolas."A fair benchmark for image watermarking systems"[J].Proc. SPIE Security and watermarking of Multimedia Contents , San Jose , CA, USA, Jan. 1999, vol. 3657,226-239.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部