吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 1447-1452.doi: 10.7964/jdxbgxb201405036

• • 上一篇    下一篇

针对未绑定问题的买卖方水印协议

温泉1, 王宇飞2, 张新鹏3   

  1. 1.吉林大学 通信工程学院,长春 130022;
    2.吉林师范大学 信息技术学院, 吉林 四平 136000;
    3.上海大学 通信与信息工程学院, 上海 200072
  • 收稿日期:2013-06-13 出版日期:2014-09-01 发布日期:2014-09-01
  • 通讯作者: 王宇飞(1978),女,讲师,博士.研究方向:信息安全.E-mail:yufei-522@163.com
  • 作者简介:温泉(1977), 男, 讲师, 博士.研究方向:信息安全.E-mail:wenquan@jlu.edu.cn
  • 基金资助:
    吉林省青年自然科学基金项目(20100183).

Buyer-seller watermarking protocol for unbinding problem

WEN Quan1,WANG Yu-fei2,ZHANG Xin-peng3   

  1. 1.College of Communication Engineering, Jilin University, Changchun 130022, China;
    2.School of Information and Technology, Jilin Normal University, Siping 136000, China;
    3.School of Communication & Information Engineering, Shanghai University, Shanghai 200072, China
  • Received:2013-06-13 Online:2014-09-01 Published:2014-09-01

摘要: 提出了基于分离加密域水印算法在客户端嵌入水印的思想,并研发了3个子协议:水印嵌入子协议、水印争端子协议、“未绑定”争端子协议。同时,结合部分加密和置换函数等相关密码技术,进一步弥补了理论上存在的水印协议漏洞。理论分析及仿真表明:本文研发的水印协议不仅有效地解决了“未绑定”问题,而且解决了“角色诚信”对协议安全的威胁,另外也避免了完全加密对协议性能的影响。

关键词: 信息处理, 数字水印, 可逆数据隐藏, 数字版权管理

Abstract: The idea of embedding watermark at the client side is proposed base on the separable encrypted watermarking algorithm. Three sub-protocols are developed, which are watermarking embedding sub-protocol, watermarking disputing sub-protocol, and unbinding problem disputing sub-protocol. At the same time, some theoretical vulnerabilities are compensated further by combining partial encryption and permutation function about cryptography. Theoretical analysis and simulation results show that the watermarking protocol developed in this paper can effectively resolve not only the unbinding problem, but also the thread caused by role integrity, and avoid the influence of full encryption on the protocol performance.

Key words: information processing, digital watermarking, reversible data hiding, digital rights management

中图分类号: 

  • TN915.08
[1] Lei Lei Win, Thomas Tony, Emmanuel Sabu. Privacy enabled digital rights management without trusted third party assumption[J]. IEEE Transactions Multimedia, 2012, 14(5):546-554.
[2] Qing Si-han. Twenty years development of security protocols research[J]. Journal of Software, 2003, 14(10):1740-1752.
[3] Qiao L, Nahrstedt K. Watermarking scheme and protocols for protecting rightful ownership and customer's rights[J]. J Vis Commun, Image Representation, 1998, 9(9):194-210.
[4] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Trans Image Process, 2001,10(4):643-649.
[5] Lei Chin-Laung, Yu Pei-Ling, Tsai Pan-lung, et al. An efficient and anonymous buyer-seller watermarking protocol[J]. IEEE Transaction on Image Processing,2004,13(12): 1618-1626.
[6] Frattolillo Franco. Watermarking protocol for web context[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(3):350-363.
[7] Chen Tzung-Her, Horng Gwoboa. A lightweight and anonymous copyright-protection protocol[J]. Computer Standards & Interface, 2007,29(2):229-237.
[8] Deng M, Bianchi T, Piva A, et al. An efficient buyer-seller watermarking protocol based on composite signal representation[C]∥Proc 11th ACM Workshop on Multimedia and Security, Princeton, NJ, New York, ACM, 2009:9-18.
[9] Rial Alfredo. A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer[J]. IEEE Transaction on Information Forensics and Security, 2011, 6(1):202-212.
[10] Katzenbeisser Stefan, Lemma Aweke, Celik Mehmet,et al. A buyer-seller watermarking protocol based on secure embedding[J]. IEEE Transaction on Information Forensics and Security, 2008, 3(4):783-786.
[11] Zhang Xin-peng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters,2011,18(4):255-258.
[12] Zhang Xin-peng. Separable reversible data hiding in encrypted image[J]. IEEE Transaction on Information Forensics and Security,2012,7(2):826-832.
[13] Adelsbach A, Katzenbeisser S, Sadeghi A R. Watermark detection with zero-knowledge disclosure[J]. ACM Multimedia Systems Journal, 2003, 9(3):266-278.
[1] 苏寒松,代志涛,刘高华,张倩芳. 结合吸收Markov链和流行排序的显著性区域检测[J]. 吉林大学学报(工学版), 2018, 48(6): 1887-1894.
[2] 徐岩,孙美双. 基于卷积神经网络的水下图像增强方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1895-1903.
[3] 黄勇,杨德运,乔赛,慕振国. 高分辨合成孔径雷达图像的耦合传统恒虚警目标检测[J]. 吉林大学学报(工学版), 2018, 48(6): 1904-1909.
[4] 李居朋,张祖成,李墨羽,缪德芳. 基于Kalman滤波的电容屏触控轨迹平滑算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1910-1916.
[5] 应欢,刘松华,唐博文,韩丽芳,周亮. 基于自适应释放策略的低开销确定性重放方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1917-1924.
[6] 陆智俊,钟超,吴敬玉. 星载合成孔径雷达图像小特征的准确分割方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1925-1930.
[7] 刘仲民,王阳,李战明,胡文瑾. 基于简单线性迭代聚类和快速最近邻区域合并的图像分割算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1931-1937.
[8] 单泽彪,刘小松,史红伟,王春阳,石要武. 动态压缩感知波达方向跟踪算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1938-1944.
[9] 姚海洋, 王海燕, 张之琛, 申晓红. 双Duffing振子逆向联合信号检测模型[J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290.
[10] 全薇, 郝晓明, 孙雅东, 柏葆华, 王禹亭. 基于实际眼结构的个性化投影式头盔物镜研制[J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297.
[11] 陈绵书, 苏越, 桑爱军, 李培鹏. 基于空间矢量模型的图像分类方法[J]. 吉林大学学报(工学版), 2018, 48(3): 943-951.
[12] 陈涛, 崔岳寒, 郭立民. 适用于单快拍的多重信号分类改进算法[J]. 吉林大学学报(工学版), 2018, 48(3): 952-956.
[13] 孟广伟, 李荣佳, 王欣, 周立明, 顾帅. 压电双材料界面裂纹的强度因子分析[J]. 吉林大学学报(工学版), 2018, 48(2): 500-506.
[14] 林金花, 王延杰, 孙宏海. 改进的自适应特征细分方法及其对Catmull-Clark曲面的实时绘制[J]. 吉林大学学报(工学版), 2018, 48(2): 625-632.
[15] 王柯, 刘富, 康冰, 霍彤彤, 周求湛. 基于沙蝎定位猎物的仿生震源定位方法[J]. 吉林大学学报(工学版), 2018, 48(2): 633-639.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!