基于半可信第三方的数字水印协议及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文应用密码学的理论和技术,针对消费者权利保护和拷贝追踪方面存在的问题进行研究,提出了一种基于半可信第三方的交互式数字水印协议(WPSTTP)。该协议规定,水印嵌入由交易双方协作完成,保证了对于买方的公平性和指纹水印的私有性。按照此协议,多媒体产品的购买者必须对所出现的该产品的任何非法拷贝负责;第三方只参与争议仲裁,交易阶段并不知晓双方的交易信息,仲裁阶段也不知晓多媒体内容中嵌入的指纹水印,达到了保护交易双方利益和隐私的目的。在协议实施的各个阶段均对信息进行了加密处理。理论分析表明,它能够满足水印信息安全性、协议公平性、指纹和实体的相关性以及指纹的私有性等条件。
     在WPSTTP设计和安全性分析的基础上,本文对基于WPSTTP的多媒体交易系统进行了初步分析和设计,提出了实现WPSTTP的基本应用框架;针对加密安全性和交互次数这两个关键问题提出了解决方案并进行了实验验证。
In this paper, we study the problems in customer's right protection and copy tracing fields by applying the theories and techniques of modern cryptography, and present a watermarking protocol based on the semi-trusted third party (WPSTTP). In this protocol, the seller cooperates with the buyer in watermark embedding, so it's fair to the buyer. And the protocol ensures the fingerprint watermark to be private. According to this protocol, the buyer has responsibility for any copy of the multimedia product he has bought; the third party only takes part in the dispute resolution, and he neither knows the information in transaction stage nor the watermark in dispute resolution phase. So the profits of the buyer and seller are protected. All the information at each stage of the protocol is encrypted. Security analysis is also made in this paper, which shows that the protocol meets the requirements of watermark security, fairness, correlation between fingerprint and the entity, private fingerprint, etc.
    According to the design and security analysis of WPSTTP,
    
    
    
    we also make the general analysis and designs of the multimedia transaction system based on WPSTTP, and give the basic implementation frame. At the same time, the experiment is done to test the encrypt-security solution. And a new solution to reduce the interactive times is also made.
引文
[1] L. Qian and K. Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customer's rights[J], Visual Commun. Image Represent, Sept.98, vol. 9, pp. 194-210
    [2] Nasir Memon, Ping Wah Wong, A Buyer-Seller Watermarking Protocol[C], IEEE Transactions on Image Processing, April 2001, Vol. 10, NO.4, pp 643-648
    [3] Gopalakrishnan, K.; Memon, N.; Vora, P.L. Protocols for Watermark Verification[C], IEEE Multimedia, October/December 2001, v 8 n 4 p 66-70
    [4] W. Bender, D.Gruhl, N.Morimoto, Technique for data hiding[R], MIT Media Lab Technical Report. 1994
    [5] N.Nikolaidis, I.Pitas, Robust image watermarking in the spatial domain[J], Signal Processing 66(1938) 385-403
    [6] I.J.Cox, J.Kilian, F.T. Leighton and T. Shamoon, Secure spread spectrum watermarking for images audio and video[A], in IEEE Int. Conference on Image Processing, 1996, vol.3.pp.243-246
    [7] Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon. Secure Spread Spectrum Watermarking for Multimedia[C], IEEE Transactions on Image Processing, December 1997, VOL. 6, NO. 12
    [8] Mauro barni, Franco Bartolini, Vito Cappellini, Alessandro Piva, A DCT-domain system for robust image watermarking[J], Signal Processing 66(1998) 357-372
    [9] Kundur, Deepa; Hatzinakos, Dimitrios, Digital watermarking for telltale tamper proofing and authentication[C], Proceedings of the IEEE v 87 n 7 1999 IEEE p 1167-1180 0018-9219
    [10] Ching-Yung Lin and Shih-Fu Chang, Semi-Fragile Watermarking for Authenticating JPEG Visual Content[A].
    [11] Fabien A.P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, Attacks on Copyright Marking Systems[C], Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 April, 1998, vol. 1525, pp. 218-238. ISBN 3-540-65386-4.
    [12] 易开祥,石教英,孙鑫,数字水印技术研究进展[J],中国图像图形学报,2001.2,vol 6,No 2,pp.111-117
    [13] 王育民,刘建伟,(M)通信网的安全—理论与技术,西安电子科技大学出版社,西安,2000
    [14] 张玉清,陈建奇等译,(M)公钥基础设施实现和管理电子安全,清华大学出版社,
    
    北京,2002
    [15] Jian Zhao, Eckhard Koch. A Generic Digital Watermarking Model[J], Computer & Graphics, Vol. 22, No. 4, pp. 397-403, 1998
    [16] Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva. Copyright protection of digital images by embedded unperceivable marks[J], Image and Vision Computing 16 (1996) 897-906
    [17] Phen-Lan Lin. Robust transparent image watermarking system with spatial mechanisms[J], The Journal of Systems and Software 50 (2000) 107-116
    [18] Craver, S.; Memon, Nasir; Yeo, Boon-Lock; Yeung, Minerva M, Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications[J], IEEE Journal on Selected Areas in Communications v 16 n 4 May 1998 IEEE Piscataway NJ USA p 573-586 0733-8716 ISACEM
    [19] Kutter, M. and F. A. P. Petitcolas, A fair benchmark for image watermarking systems[J],Elcetronic Imaging '99. Security and Watermarking of Multimedia Contents, vol.3657,Sans Jose, CA, USA,25-27 January 1999.
    [20] Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, and Jang-Ping Sheu. Mean Quantization Blind Watermarking for Image Authentication[A].
    [21] Eugene T. Lin and Edward J. Delp. A Review of Data Hiding in Digital Images, http://dynamo.ecn.purdue.edu/~ace
    [22] Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao. Mean-quantization-based fragile watermarking for image authentication[J], Optical Engineering v 40 n 7 July 2001 p 1396-1408 0091-3286
    [23] W. Zeng and B.Liu, A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images[C], IEEE Trans. Image Processing, vol.8, pp.1534-1548, Nov. 1999
    [24] 董丽丽,网络安全协议及算法[J],石油仪器,1998,12(2):32-33
    [25] 孔静萍,Internet的安全通信协议SSL与SET的剖析和比较[J],现代计算机,2000.4,89:10-12
    [26] 曾小平,孙永强,用Spi演算描述密码学安全协议[J],上海交通大学学报,vol.32,No.10,pp.98-101,Oct.1998
    [27] 卿斯汉,一种新型的非否认协议[J],软件学报,2000,11(10):1338-1343
    [28] 白硕,隋立颖,陈庆锋等,安全协议的验证逻辑[J],软件学报,2000,11(2):213-221
    [29] 周展飞,周典萃,王贵林等,电子商务协议的公平性[J],电子学报,vol.28,No.9,pp.13-15,Sep.2000
    [30] 卢震宇,戴英侠,连一峰,建立于PKI之上的安全文件传输系统的分析和构建[J],计算机工程与应用,2002,11,146-167
    
    
    [31] 邓菲,李志华,李训铭,基于Windows Crypto API的数字签名及其在管理系统中的实现[J],工业控制计算机,2002年15卷第8期,9-11

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700