首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 507 毫秒
1.
提出了一种新颖的用于盗版追踪的买方卖方水印协议.在此协议中,引入的水印认证授权中心WCA,它能为买方一次生成多个数字水印,从而不需要参与买卖双方的每次数字产品交易.为了保证买方的匿名,WCA还对买方的数字证书加密,并通过买方把加密的数字证书传给卖方.此外,该水印协议还能很好地解决消费者权益、水印绑定、买方匿名、共谋、争论等问题.分析表明:提出的协议是安全有效的.  相似文献   

2.
胡云  郭芬红  杨义先 《信号处理》2003,19(Z1):153-156
针对Wong提出的系列水印算法,本文给出了一种有效的协议攻击并提出了一种新的能够抵抗该协议攻击的脆弱水印算法.新算法将鲁棒性水印与脆弱性水印相结合来构造图像完整性和认证性水印.实验表明新算法不但能抵抗协议攻击,而且具有隐蔽性,能检测图像大小和像素值的改变,并能定位被改变的像素.此外,由于有了鲁棒性水印,增加了对版权的认证能力.  相似文献   

3.
文章提出了一种通过匿名方式进行通信的E-Mail认证协议,该协议借助离线可信第三方(Off-line Trusted Third Party)传递电子邮件内容,既能保证邮件内容的私密性,又能保证通信主体的匿名性。协议分为主协议、取消协议和完成协议三部分,具有不可否认性、公平性和认证性等性质。  相似文献   

4.
抗共谋攻击的视频水印算法   总被引:1,自引:0,他引:1  
提出了一种基于内容的抗线性共谋攻击的视频水印算法.根据图像的视觉特征以及区域DCT系数的关系,选择水印嵌入区域.利用局部JND(just-noticeable distortion)值,得到一种自适应的摹于视觉内容的扩频水印方案.实验结果表明,该水印方案能有效地抵抗第一类和第二类线性共谋攻击,具有较强的顽健性、稳定性和视觉不可见性.  相似文献   

5.
当今数字媒体作品拷贝、篡改等侵权问题愈演愈烈,因此进行语音信号的抗共谋攻击研究对维护音频发行者的版权和数字音乐产品市场的正常运行很有必要,本文建立DCT变换模型,将复杂的时域问题转换为频域内的问题,通过MATLAB、EXCEL等软件进行数据分析,利用人耳隐蔽效应,在音频信号允许的波动范围内,对原始音频文件数据作分帧分段处理,以特定的水印作为指纹信息,对音频采样点数据进行修改,从而实现指纹信息的嵌入。同时将水印前后的音频图像、MOS标准以及信噪比作为评价嵌入水印后音频质量评价的依据,证明本文选择的模型良好。根据实验所得的嵌入指纹信息前后的波形,得到除个别奇异值外,嵌入水印信息前后无明显差异,因此认为嵌入水印信息后对原始音频文件数据影响不大。此外,本文随机选取20名测试者对嵌入水印信息的音频文件进行测听并评分,评分结果的平均值为4.8,依据MOS打分标准得到音频质量为优,即符合要求;此外,本文分别计算了原始音频信号及嵌入指纹信息后音频信号的信噪比,嵌入指纹信息后音频信号信噪比由61.3713dB降为18.6198dB,从主观和客观角度均证明嵌入水印后音频的性能较好;为了能够根据用户共谋所得的音频数据找出共谋用户,本文以"与"共谋攻击和平均共谋攻击为例,使用Matlab进行仿真实验,结果表明,无论采取何种共谋方式,均能根据文中相应的公式得到参与共谋的用户,进而达到维护音频发行者版权的目的。  相似文献   

6.
基于奇异值分解的水印算法中,利用正交矩阵实现水印的嵌入保证了水印的不可替换性.但在修改正交矩阵时,如果不保持矩阵的正交性,就会对提取出水印的正确率产生影响.为了解决这一问题,提出了一种基于二维离散余弦变换与奇异值分解相结合的数字图像水印新算法.在水印嵌入时,对图像子块的DCT系数矩阵进行SVD分解,利用三角函数的正交性...  相似文献   

7.
欧阳郡  方勇  王书歌 《通信技术》2010,43(5):116-118
为解决一般的身份鉴别机制不适用于具有匿名通信要求的P2P网络系统模型的难题。通过对Diffle-Hellman密钥协商协议进行改进,并结合采用RSA数字签名协议,以及零知识证明GQ协议,提出了一种新的基于服务令牌对P2P匿名通信系统中的通信双方进行身份鉴别的机制。该机制在保证P2P匿名通信系统各种普遍特征的前提下,通过在P2P匿名通信系统中引入可信第三方节点,针对P2P匿名通信系统中各通信节点进行匿名控制和行为管理,同时既可抵御各种常见网络攻击的威胁,又有效实现了P2P匿名通信系统的身份鉴别,从而有效提高了P2P匿名通信系统的安全性,加强了此种系统的管理能力。  相似文献   

8.
提出一种分簇无线传感器网络中匿名的簇头选举协议。给出了匿名簇头选举的判定规则及成簇模式,并采用基于双线性对的匿名否决协议对选举结果进行验证以保证存在节点成功当选。设计了相应的匿名数据聚合方案,无需泄露节点身份信息即可完成聚合。分析及仿真结果表明,协议同时实现了簇头选举的匿名性、高效性及安全性,可有效抵抗窃听攻击、节点妥协攻击及合谋攻击等恶意行为。  相似文献   

9.
一种具有阅读器匿名功能的射频识别认证协议   总被引:1,自引:0,他引:1  
在射频识别(RFID)的应用中,安全问题特别是用户隐私问题正日益凸显。因此,(用户)标签信息的隐私保护的需求越来越迫切。在RFID系统中,标签的隐私保护不仅是对外部攻击者,也应该包括阅读器。而现有许多文献提出的认证协议的安全仅针对外部攻击者,甚至在外部攻击者的不同攻击方法下也并不能完全保证安全。该文提出两个标签对阅读器匿名的认证协议:列表式RFID认证协议和密钥更新式RFID认证协议。这两个协议保证了阅读器对标签认证时,标签的信息不仅对外部攻击者是安全的而且对阅读器也保持匿名和不可追踪。相较于Armknecht等人提出的对阅读器匿名和不可追踪的认证协议,该文所提的协议不再需要增加第三方帮助来完成认证。并且密钥更新式RFID匿名认证协议还保证了撤销后的标签对阅读器也是匿名性和不可追踪的。  相似文献   

10.
针对云计算中数据位置验证存在的共谋攻击,本文提出了抗共谋攻击的数据位置验证协议.首先给出了数据位置验证的系统模型,分析了安全威胁,并给出了数据位置验证的安全定义.随后,将安全定位协议与数据持有性证明协议相结合,设计了一维空间下的数据位置验证协议,并证明了所提协议满足安全定义且能抵御共谋攻击.在一维协议基础之上,构建了三维空间下的数据位置验证协议.最后,在三维空间下将本文所提协议与Lost协议和Geoproof协议进行了性能的测试和比较.结果表明所提协议能够验证服务器具体位置且能抵御共谋攻击.  相似文献   

11.
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol  相似文献   

12.
An efficient and anonymous buyer-seller watermarking protocol   总被引:5,自引:0,他引:5  
For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.  相似文献   

13.
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.  相似文献   

14.
Data hiding with video independent components   总被引:1,自引:0,他引:1  
Sun  J. Liu  J. 《Electronics letters》2004,40(14):858-859
Video watermarking is a main technique for video copyright protection. A novel blind video watermarking scheme is proposed, which embeds a watermark into video independent components by using the four-neighbouring-mean-based method. Temporal synchronisation is achieved efficiently. Simulations show that the scheme is robust to MPEG2 compression and collusion attacks.  相似文献   

15.
Electronic copyright protection is increasingly dependent on fingerprinting and watermarking techniques. The properties of dual binary Hamming codes are exploited to obtain fingerprinting scheme secure against collusion of two buyers. The advantage over previous proposals is that collusion security is obtained using well-known and shorter length error correcting codes  相似文献   

16.
In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.  相似文献   

17.
在分析以往几种数字水印隐患的基础上,得出一个安全数字水印协议应具备的条件,提出了一个新的数字水印协议并基于此协议设计了一个交易买卖系统.该协议引入了可信任的第三方、数字签名和数字时间戳技术,从而提高数字产品交易的安全性,保护了买卖双方的权益.  相似文献   

18.
A wavelet based multiresolution watermarking method using the human visual system (HVS) is proposed, with the number of watermarks embedded proportional to the energy contained in each band. Experiments show that the proposed three-level wavelet based watermarking method is robust to some attacks such as, for example, joint photographic experts group (JPEG) compression, smoothing, cropping and collusion  相似文献   

19.
运动补偿时域帧平均(MC TFA)共谋攻击利用时域上的冗余来去除时域不相关的水印,这对视频水印提出了运动一致性的要求,即水印需要随着视频的运动而做相应的变化。本文提出一种可有效抵抗MC TFA攻击的空域视频水印。对原始视频做基于宏块的运动估计得到运动矢量,据此对原始水印进行以宏块为单位的移位调整得到嵌入水印。因为嵌入水印和原始视频的运动矢量是一样的,所以它具有运动一致性。本文接着证明了嵌入运动一致性水印不会影响视频的运动矢量,因此在检测端对加水印的视频做运动估计就可以得到与嵌入水印之前一样的运动矢量,从而恢复出所嵌入的水印,最后用归一化相关系数的方法来检测其中是否含有水印。该方法能与MPEG编码器结合且算法简单,实验结果表明它能够有效抵抗MC TFA攻击。此外,该水印嵌入方法的运动一致性通过PVinod[5]等人提出的方法进一步得到了验证。   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号