期刊文献+

数字指纹协议的研究与发展 被引量:1

Research and Development of Digital Fingerprinting Protocol
在线阅读 下载PDF
导出
摘要 With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes. With the development of e-commerce, digital product has been the main format of multimedia product on the Internet. At the same time, the problem of copyright protection has gained much attention. Because of the character to be copied easily, the software products such as JPEG or GIF images, applications and documents are being copied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is to study a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied in all kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embed an unique 'fingerprint' into each copy of the product sent to the buyer. When finding the illegal copy, the merchant can trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can protect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the important protocol schemes.
作者 颜浩 陈克非
出处 《计算机科学》 CSCD 北大核心 2002年第12期146-149,共4页 Computer Science
关键词 数字指纹协议 数字水印 数字图像 图像处理 版权保护 Fingerprinting protocol, Copyright protection, Secure 2-party computation, Bit commitment
  • 相关文献

参考文献20

  • 1Wagner N R.Fingerprinting; 1983 Symposium on Security and Privacy, IEEE, Oakland, California, 18~22
  • 2Chor B, Fiat A, Naor M.Tracing Traitors;Crypto'94, LNCS 839, Springer-Verlag, Berlin, 1994.257~270
  • 3Boneh D, Shaw J.Collusion-Secure Fingerprinting for Digital Data;Crypto'95,LNCS 963, Springer-Verlag, Berlin, 1995.452~465
  • 4Pfitzmann B, Schunter M.Asymmetric Fingerprinting; Eurocrypt'96, LNCS 1070, Springer-Verlag, Berlin, 1996.84~95
  • 5Pfitzmann B, Waidner M.Anonymous Fingerprinting; Eurocrypt'97, LNCS1233, Springer-Verlag, Berlin, 1997.88~102
  • 6Naor M,Pinkas B.Threshold Traitor Tracing; Crypto'98, LNCS 1462,Springer-Verlag, Berlin,1998.502~517
  • 7Pfitzmann B,Waidner M.Asymmetric Fingerprinting for Larger Collusions; accepted for 4th ACM Conference on Computer and Communications Security, 1997
  • 8Biehl I,Meyer B.Protocols for Collusion-Secure Asymmetric Fingerprint-ing; STACS 97, LNCS 1200, Springer-Verlag, Berlin,1997.399~412
  • 9Domingo-Ferrer J.Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributors; Electronics Letters 34/13,1998.1303~1304
  • 10Blakley G R,Meadows C,Purdy G B.Fingerprinting Long Forgiving Messages; Crypto'85, LNCS 218, Springer-Verlag, Berlin,1986.180~189

同被引文献17

  • 1刘立刚,陈晓苏,胡蕾.抗协议攻击的数字版权保护安全方案[J].中山大学学报(自然科学版),2004,43(A02):83-86. 被引量:6
  • 2陈晓苏,卢炜,刘立刚,肖道举.一种基于数字水印和数字签名的消费者权益保护协议[J].计算机工程与科学,2005,27(1):3-5. 被引量:6
  • 3袁中兰,夏光升,温巧燕,杨义先.数字作品著作权保护协议[J].北京邮电大学学报,2005,28(1):19-22. 被引量:16
  • 4陈政.一种新的交互式买方-卖方数字水印协议[J].武汉理工大学学报(信息与管理工程版),2005,27(5):35-37. 被引量:4
  • 5Cox I J,Miller M L,Mckellips A L.Watermarking'as communications with side information[J].Proceedings of the IEEE,1999,87(7).
  • 6Petitmlas F A P,Anderson R J,Kuhn M G.Information hiding:a survey[J].Proceedings of IEEE, 1999:1062-1078.
  • 7Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia Special Issue on Security, 2001 ( 10/11 ) : 22-28.
  • 8Johnson N F,Duric Z,Jajodia S.Information hiding:steganography and watermarking---attacks and countermeasures[M].[S.l.]:Kluwer Academic Publishers,2001.
  • 9Cox I J,Miller M L,Bloom J A.Watermarking application and their properties[C]//Int Conf on Information Technology 2000, LasVegas, 2000.
  • 10Memon N,Wong P W.A buyer -seller watermark protocol[J].IEEE Transactions on Image Processing, 2001,10(4) :643-649.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部