Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol

被引:30
作者
Chen, Tzung-Her
Tsai, Du-Shiau
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 402, Taiwan
[3] Hsiuping Inst Technol, Dept Informat Management, Taichung 412, Taiwan
关键词
visual cryptography; watermarking; watermarking protocol; copyright protection; digital signature; digital timestamp;
D O I
10.1016/j.patcog.2006.02.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, there have been more and more robust watermarking schemes proposed for copyright protection of digital documents. The authors combine cryptography with watermarking to simultaneously address the problems of protecting the owner's copyright and the legal customer's ownership. The authors propose a robust watermarking scheme based on visual cryptography and a watermarking protocol based on asymmetric cryptography. It is worthwhile to note that the proposed schemes are resistant to counterfeit, collusion, averaging, and copy attacks, while the large majority of robust watermarking schemes are not. Furthermore, the application of digital signature and timestamp makes public verification possible. (c) 2006 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1530 / 1541
页数:12
相关论文
共 12 条
[1]   A copyright protection scheme of images based on visual cryptography [J].
Chang, CC ;
Wu, HC .
IMAGING SCIENCE JOURNAL, 2001, 49 (03) :141-150
[2]   A virtual image cryptosystem based upon vector quantization [J].
Chen, TS ;
Chang, CC ;
Hwang, MS .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) :1485-1488
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]  
Craver S, 1998, COMMUN ACM, V41, P44, DOI 10.1145/278476.278486
[5]  
HOU YC, 2000, IEEE INT C SIGN PROC, V2, P992
[6]   On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking [J].
Katzenbeisser, S .
12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2001, :815-819
[7]   The watermark copy attack [J].
Kutter, M ;
Voloshynovskiy, S ;
Herrigel, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :371-380
[8]   A buyer-seller watermarking protocol [J].
Memon, N ;
Wong, PW .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (04) :643-649
[9]  
Naor M., 1994, Lecture Notes in Comput. Sci., P1, DOI 10.1007/BFb0053419
[10]   Watermarking schemes and protocols for protecting rightful ownership and customer's rights [J].
Qiao, LT ;
Nahrstedt, K .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 1998, 9 (03) :194-210