Sadeghi A R, Stuble C. Towards multilateral-secure DRM platforms//ISPEC 2005. Berlin: Springer-Verlag, 2005: 326-337.
[2]
Trusted Computing Group. Trusted computing platform alliance main specification. 2003(2003-08-01).
[3]
Felten Edward W. DRM and public policy[J]. Communications of the ACM, 2005, 48(7): 112.
[4]
Furon T, Duhamel P. An asymmetric watermarking method[J]. IEEE Transactions on Signal Processing, 2003, 51(4): 981-995.
[5]
Chang Fengcheng, Huang Hsiangcheh, Hang Hsuehming. Layered access control schemes on watermarked scalable media//Circuits and Systems, ISCAS 2005. Kobe: IEEE CAS Society, 2005: 4983-4986.
[6]
Voloshynovskiy S, Pereira S, Pun T, et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks[J]. Communications Magazine, IEEE, 2001, 39(8): 118-126.
[7]
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications[J]. Selected Areas in Communications, IEEE Journal on, 1998, 16(4): 573-586.
[8]
冯登国. 可证安全性理论与方法[J]. 软件学报, 2005, 16(10): 1743-1756. Feng Dengguo. Research on theory and approach of provable security[J]. Journal of Software, 2005, 16(10): 1743-1756.
袁中兰, 夏光升, 温巧燕, 等. 数字作品著作权保护协议[J]. 北京邮电大学学报, 2005, 28(1): 19-22. Yuan Zhonglan, Xia Guangsheng, Wen Qiaoyan, et al. Copyright protection protocol for digital media[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 19-22.
[11]
钮心忻. 信息隐藏与数字水印[M]. 北京: 北京邮电大学出版社, 2004.
[12]
Lin E T, Eskicioglu A M, Lagendijk R L, et al. Advances in digital video content protection[J]. Proceedings of the IEEE, 2005, 93(1): 171-183.
[13]
Mandal P, Thakral A, Verma S. Watermark based digital rights management//Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC'05). 2005: 74-78.
[14]
Open Mobile Alliance(OMA). Open mobile alliance: DRM architecture draft version 2.0-20 August 2004. 2004(2004-08-27).
[15]
刘立刚, 陈晓苏, 胡蕾, 抗协议攻击的版权保护安全方案[J]. 中山大学学报, 2004, 43(2): 83-86. Liu Ligang, Chen Xiaosu, Hu Le. Digital copyright protection security schemes against protocol attacks[J]. ACTA Scientiarum Naturalium Universitatis Sunyatseni, 2004, 43(2): 83-86.