全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于水印和密码技术的数字版权保护模式

DOI: 10.13190/jbupt.200605.98.170, PP. 98-102

Keywords: 数字版权保护,WCDRM模式,水印,密码技术

Full-Text   Cite this paper   Add to My Lib

Abstract:

综合考虑数字版权保护的实际需求和安全隐患,结合水印技术和密码技术提出了一种新的数字版权保护模式(WCDRM),模式中共有7个实体,其中有3个权威机构。讨论了模式的注册过程、在线交易过程、验证过程和仲裁过程,该模式可以提供多种服务。模式将作者身份标识、版权发行机构身份标识和消费者身份标识作为盲信息水印数据隐藏在数据作品中,还采用了密码算法、密码协议和水印协议技术,可以抵抗各种算法攻击和协议攻击,具有较高的安全性和较好的实用性

References

[1]  Sadeghi A R, Stuble C. Towards multilateral-secure DRM platforms//ISPEC 2005. Berlin: Springer-Verlag, 2005: 326-337.
[2]  Trusted Computing Group. Trusted computing platform alliance main specification. 2003(2003-08-01).
[3]  Felten Edward W. DRM and public policy[J]. Communications of the ACM, 2005, 48(7): 112.
[4]  Furon T, Duhamel P. An asymmetric watermarking method[J]. IEEE Transactions on Signal Processing, 2003, 51(4): 981-995.
[5]  Chang Fengcheng, Huang Hsiangcheh, Hang Hsuehming. Layered access control schemes on watermarked scalable media//Circuits and Systems, ISCAS 2005. Kobe: IEEE CAS Society, 2005: 4983-4986.
[6]  Voloshynovskiy S, Pereira S, Pun T, et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks[J]. Communications Magazine, IEEE, 2001, 39(8): 118-126.
[7]  Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications[J]. Selected Areas in Communications, IEEE Journal on, 1998, 16(4): 573-586.
[8]  冯登国. 可证安全性理论与方法[J]. 软件学报, 2005, 16(10): 1743-1756. Feng Dengguo. Research on theory and approach of provable security[J]. Journal of Software, 2005, 16(10): 1743-1756.
[9]  Cheng Zhaohui, Vasiu L, Comely R. Pairing-Based One-Round Tripartite Key Agreement Protocols. 2004.
[10]  袁中兰, 夏光升, 温巧燕, 等. 数字作品著作权保护协议[J]. 北京邮电大学学报, 2005, 28(1): 19-22. Yuan Zhonglan, Xia Guangsheng, Wen Qiaoyan, et al. Copyright protection protocol for digital media[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 19-22.
[11]  钮心忻. 信息隐藏与数字水印[M]. 北京: 北京邮电大学出版社, 2004.
[12]  Lin E T, Eskicioglu A M, Lagendijk R L, et al. Advances in digital video content protection[J]. Proceedings of the IEEE, 2005, 93(1): 171-183.
[13]  Mandal P, Thakral A, Verma S. Watermark based digital rights management//Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC'05). 2005: 74-78.
[14]  Open Mobile Alliance(OMA). Open mobile alliance: DRM architecture draft version 2.0-20 August 2004. 2004(2004-08-27).
[15]  刘立刚, 陈晓苏, 胡蕾, 抗协议攻击的版权保护安全方案[J]. 中山大学学报, 2004, 43(2): 83-86. Liu Ligang, Chen Xiaosu, Hu Le. Digital copyright protection security schemes against protocol attacks[J]. ACTA Scientiarum Naturalium Universitatis Sunyatseni, 2004, 43(2): 83-86.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133