共查询到19条相似文献,搜索用时 507 毫秒
1.
胡玉平 《微电子学与计算机》2009,26(6)
提出了一种新颖的用于盗版追踪的买方卖方水印协议.在此协议中,引入的水印认证授权中心WCA,它能为买方一次生成多个数字水印,从而不需要参与买卖双方的每次数字产品交易.为了保证买方的匿名,WCA还对买方的数字证书加密,并通过买方把加密的数字证书传给卖方.此外,该水印协议还能很好地解决消费者权益、水印绑定、买方匿名、共谋、争论等问题.分析表明:提出的协议是安全有效的. 相似文献
2.
3.
文章提出了一种通过匿名方式进行通信的E-Mail认证协议,该协议借助离线可信第三方(Off-line Trusted Third Party)传递电子邮件内容,既能保证邮件内容的私密性,又能保证通信主体的匿名性。协议分为主协议、取消协议和完成协议三部分,具有不可否认性、公平性和认证性等性质。 相似文献
4.
5.
《信息通信》2019,(11)
当今数字媒体作品拷贝、篡改等侵权问题愈演愈烈,因此进行语音信号的抗共谋攻击研究对维护音频发行者的版权和数字音乐产品市场的正常运行很有必要,本文建立DCT变换模型,将复杂的时域问题转换为频域内的问题,通过MATLAB、EXCEL等软件进行数据分析,利用人耳隐蔽效应,在音频信号允许的波动范围内,对原始音频文件数据作分帧分段处理,以特定的水印作为指纹信息,对音频采样点数据进行修改,从而实现指纹信息的嵌入。同时将水印前后的音频图像、MOS标准以及信噪比作为评价嵌入水印后音频质量评价的依据,证明本文选择的模型良好。根据实验所得的嵌入指纹信息前后的波形,得到除个别奇异值外,嵌入水印信息前后无明显差异,因此认为嵌入水印信息后对原始音频文件数据影响不大。此外,本文随机选取20名测试者对嵌入水印信息的音频文件进行测听并评分,评分结果的平均值为4.8,依据MOS打分标准得到音频质量为优,即符合要求;此外,本文分别计算了原始音频信号及嵌入指纹信息后音频信号的信噪比,嵌入指纹信息后音频信号信噪比由61.3713dB降为18.6198dB,从主观和客观角度均证明嵌入水印后音频的性能较好;为了能够根据用户共谋所得的音频数据找出共谋用户,本文以"与"共谋攻击和平均共谋攻击为例,使用Matlab进行仿真实验,结果表明,无论采取何种共谋方式,均能根据文中相应的公式得到参与共谋的用户,进而达到维护音频发行者版权的目的。 相似文献
6.
7.
为解决一般的身份鉴别机制不适用于具有匿名通信要求的P2P网络系统模型的难题。通过对Diffle-Hellman密钥协商协议进行改进,并结合采用RSA数字签名协议,以及零知识证明GQ协议,提出了一种新的基于服务令牌对P2P匿名通信系统中的通信双方进行身份鉴别的机制。该机制在保证P2P匿名通信系统各种普遍特征的前提下,通过在P2P匿名通信系统中引入可信第三方节点,针对P2P匿名通信系统中各通信节点进行匿名控制和行为管理,同时既可抵御各种常见网络攻击的威胁,又有效实现了P2P匿名通信系统的身份鉴别,从而有效提高了P2P匿名通信系统的安全性,加强了此种系统的管理能力。 相似文献
8.
9.
一种具有阅读器匿名功能的射频识别认证协议 总被引:1,自引:0,他引:1
在射频识别(RFID)的应用中,安全问题特别是用户隐私问题正日益凸显。因此,(用户)标签信息的隐私保护的需求越来越迫切。在RFID系统中,标签的隐私保护不仅是对外部攻击者,也应该包括阅读器。而现有许多文献提出的认证协议的安全仅针对外部攻击者,甚至在外部攻击者的不同攻击方法下也并不能完全保证安全。该文提出两个标签对阅读器匿名的认证协议:列表式RFID认证协议和密钥更新式RFID认证协议。这两个协议保证了阅读器对标签认证时,标签的信息不仅对外部攻击者是安全的而且对阅读器也保持匿名和不可追踪。相较于Armknecht等人提出的对阅读器匿名和不可追踪的认证协议,该文所提的协议不再需要增加第三方帮助来完成认证。并且密钥更新式RFID匿名认证协议还保证了撤销后的标签对阅读器也是匿名性和不可追踪的。 相似文献
10.
针对云计算中数据位置验证存在的共谋攻击,本文提出了抗共谋攻击的数据位置验证协议.首先给出了数据位置验证的系统模型,分析了安全威胁,并给出了数据位置验证的安全定义.随后,将安全定位协议与数据持有性证明协议相结合,设计了一维空间下的数据位置验证协议,并证明了所提协议满足安全定义且能抵御共谋攻击.在一维协议基础之上,构建了三维空间下的数据位置验证协议.最后,在三维空间下将本文所提协议与Lost协议和Geoproof协议进行了性能的测试和比较.结果表明所提协议能够验证服务器具体位置且能抵御共谋攻击. 相似文献
11.
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol 相似文献
12.
An efficient and anonymous buyer-seller watermarking protocol 总被引:5,自引:0,他引:5
Chin-Laung Lei Pei-Ling Yu Pan-Lung Tsai Ming-Hwa Chan 《IEEE transactions on image processing》2004,13(12):1618-1626
For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol. 相似文献
13.
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application. 相似文献
14.
Data hiding with video independent components 总被引:1,自引:0,他引:1
Video watermarking is a main technique for video copyright protection. A novel blind video watermarking scheme is proposed, which embeds a watermark into video independent components by using the four-neighbouring-mean-based method. Temporal synchronisation is achieved efficiently. Simulations show that the scheme is robust to MPEG2 compression and collusion attacks. 相似文献
15.
Electronic copyright protection is increasingly dependent on fingerprinting and watermarking techniques. The properties of dual binary Hamming codes are exploited to obtain fingerprinting scheme secure against collusion of two buyers. The advantage over previous proposals is that collusion security is obtained using well-known and shorter length error correcting codes 相似文献
16.
In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy. 相似文献
17.
18.
Young-Sik Kim O-Hyung Kwon Rae-Hong Park 《Electronics letters》1999,35(6):466-468
A wavelet based multiresolution watermarking method using the human visual system (HVS) is proposed, with the number of watermarks embedded proportional to the energy contained in each band. Experiments show that the proposed three-level wavelet based watermarking method is robust to some attacks such as, for example, joint photographic experts group (JPEG) compression, smoothing, cropping and collusion 相似文献
19.
运动补偿时域帧平均(MC TFA)共谋攻击利用时域上的冗余来去除时域不相关的水印,这对视频水印提出了运动一致性的要求,即水印需要随着视频的运动而做相应的变化。本文提出一种可有效抵抗MC TFA攻击的空域视频水印。对原始视频做基于宏块的运动估计得到运动矢量,据此对原始水印进行以宏块为单位的移位调整得到嵌入水印。因为嵌入水印和原始视频的运动矢量是一样的,所以它具有运动一致性。本文接着证明了嵌入运动一致性水印不会影响视频的运动矢量,因此在检测端对加水印的视频做运动估计就可以得到与嵌入水印之前一样的运动矢量,从而恢复出所嵌入的水印,最后用归一化相关系数的方法来检测其中是否含有水印。该方法能与MPEG编码器结合且算法简单,实验结果表明它能够有效抵抗MC TFA攻击。此外,该水印嵌入方法的运动一致性通过PVinod[5]等人提出的方法进一步得到了验证。 相似文献