摘要
With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.
With the development of e-commerce, digital product has been the main format of multimedia product on the Internet. At the same time, the problem of copyright protection has gained much attention. Because of the character to be copied easily, the software products such as JPEG or GIF images, applications and documents are being copied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is to study a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied in all kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embed an unique 'fingerprint' into each copy of the product sent to the buyer. When finding the illegal copy, the merchant can trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can protect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the important protocol schemes.
出处
《计算机科学》
CSCD
北大核心
2002年第12期146-149,共4页
Computer Science
关键词
数字指纹协议
数字水印
数字图像
图像处理
版权保护
Fingerprinting protocol, Copyright protection, Secure 2-party computation, Bit commitment