首页 | 本学科首页   官方微博 | 高级检索  
     

零知识水印验证协议
引用本文:邹潇湘,戴琼,黄晁,李锦涛.零知识水印验证协议[J].软件学报,2003,14(9):1645-1651.
作者姓名:邹潇湘  戴琼  黄晁  李锦涛
作者单位:1. 中国科学院,计算技术研究所,北京,100080;中国科学院,计算技术研究所,北京,100080
2. 中国科学院,软件研究所,北京,100080
3. 中国科学院,计算技术研究所,北京,100080
基金项目:Supported by the National High-Tech Research and Development Plan of China under Grant No.2001AA114010 (国家高技术研究发展计划(863)
摘    要:在数字产品中嵌入数字水印,是对其进行版权保护的一种有力手段.近年来提出了不少数字水印方案,但是它们中大部分都是对称的,即用于水印嵌入和水印检测的密钥是相同的.而许多实际的应用都要求非对称的数字水印方案,即水印检测时所知道的秘密不足以修改、伪造或移去水印.对基于比特承诺和零知识证明的水印验证协议进行了研究.所有权证明者采用基于扩频的对称水印技术,在宿主信号中嵌入水印;水印检测的密钥采用比特承诺的形式提交给验证者,通过证明者和验证者之间的交互协议,验证者可以提取到所嵌入的水印,但无法修改、伪造或移去水印.分别提出了验证一个和多个水印比特的协议,可应用于验证嵌入在图像、音频和视频数据中的扩频水印.

关 键 词:数字水印  对称水印  非对称水印  比特承诺  零知识证明
文章编号:1000-9825/2003/14(09)1645
收稿时间:2003/1/10 0:00:00
修稿时间:2003年1月10日

Zero Knowledge Watermark Verification Protocols
ZOU Xiao-Xiang,DAI Qiong,HUANG Chao and LI Jin-Tao.Zero Knowledge Watermark Verification Protocols[J].Journal of Software,2003,14(9):1645-1651.
Authors:ZOU Xiao-Xiang  DAI Qiong  HUANG Chao and LI Jin-Tao
Abstract:Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Several different schemes have been proposed in the last few years, but most of them are symmetric, i.e., the key used for watermark embedding is just the same used for watermark detection. However, in many applications, an asymmetric scheme is needed, where the secrete information used to detect the watermark is not enough to modify, counterfeit or remove the watermark. In this paper, some watermark verification protocols based on bit commitment and zero knowledge proof are proposed. The ownership prover insert the watermark into the host signal using symmetric watermark technology based on spread spectrum. The watermark detect key is sent to the verifier hiding in bit commitment. By the interactive protocol between the prover and the verifier, the verifier can extract the embedded watermark, but he can not modify, counterfeit or remove it. Protocols are proposed to verify one watermark bit and several watermark bits respectively. Those protocols can be used to verify the watermark information inserted into image, audio and video using spread spectrum watermark technology.
Keywords:digital watermark  symmetric watermark  asymmetric watermark  bit commitment  zero knowledge proof
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号