期刊文献+

数字指纹──新型数字版权保护技术 被引量:1

Actual condition and developing direction of digital finerprint based on image
下载PDF
导出
摘要 主要介绍了以数字图像为载体的数字指纹技术的需求和发展,阐述了数字指纹的定义、特征、分类及系统模型,并对数字指纹的攻击和方案作了简要讨论,最后提出了数字指纹技术的研究方向。 This paper introduces mainly the need and development of digital fingerprint based on digital image, gives the definition,character,dassification and systemic model of digital fingerprint, discusses simply the attack to digital fingerprint and scheme of digital fingerprint, finally puts forward the developing direction of digital fingerprint.
出处 《信息技术》 2005年第4期79-82,共4页 Information Technology
关键词 数字图像 数字指纹 方案 digital image digital fingerprint scheme
  • 相关文献

参考文献7

  • 1Wagner N.Fingerprinting[A].Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983,(8): 18 - 22. 被引量:1
  • 2Chor B Fiat, Naor M. Tracing Traitors[ R]. Proceeding of Crypto'94,1994.257 - 270. 被引量:1
  • 3Boneh D, Shaw J. Collusion- Secure Fingerprinting for Digital Data [R]. in 15th Annual International Crytology Conference. Santa Barbara, California, U. S.A. Number 963 in Lecture Notes in Computer Science. 1995, (8) :452 - 465 被引量:1
  • 4Pfitzmann B, Schunter M. Asymmetric Fingerprinting[J]. In Eurocrypt'96,Saragossa, Spain, Number 1070 in Lecture Notes Computer Science. Springer - Verlag, 1996, (5): 84 - 95 被引量:1
  • 5Pfitzmann B, Waidner M.Anonymous Fingerprinting[J].In Eurocrypt '97.Konstanz, Germany, Number 1233 in Lecture Notes in Computer Science. Springer- Verlag, 1997, (5) :88 - 102 被引量:1
  • 6李勇,杨波,华翔.一种高效匿名的数字指纹方案[J].西安电子科技大学学报,2003,30(3):394-398. 被引量:7
  • 7王丽娜,张焕国编著..信息隐藏技术与应用[M].武汉:武汉大学出版社,2003:134.

二级参考文献10

  • 1Blakeley G R,Meadows C,Purdy G B.Fingerprinting Long Forgiving Messages[A].Crypto’85[C].Berlin:Springer-Verlag,1986.180-189. 被引量:1
  • 2Boneh D,Shaw J.Collusion-secure Fingerprinting for Digital Data[A].Advances in Cryptology,Proceedings of CRYPTO’95[C].Berlin:Spnnger-Verlag,1995.452—465. 被引量:1
  • 3Pfitzmann B,Schunter M.Asymmetric Fingerprinting[A].Advances in Cryptolngy,Proceedings of EUROCRYPT'96[C].Berlin:Springer—Verlag,1996.84-95. 被引量:1
  • 4Pfitzmann B,Waidner M.Asymmetric Fingerprinting for Larger Collusions[A].4th ACM Conference on Computer and Communication Security[C].Berlin:Springer-Verlag,1977.151—160. 被引量:1
  • 5Biehl I.Meyer B.Protocols for Collusion-secure Asymmetric Fingerprinting[A].STACS97[C].Berlin:Springer-Verlag,1997.399—412. 被引量:1
  • 6Pfitzmann B,Waidner M.Anonymous Fingerprinting[A].Advances in Cryptology,Proceedings of EUROCRYPT'97[C].Berlin:Springer-Verlag,1997.88—102. 被引量:1
  • 7Domingo-Ferrer J.Anonymous Fingerprinting of E1ectronic Information with Automatic Identification of Redistributors[J].Electonics Letters,1998,43(13):1 303—1 304. 被引量:1
  • 8Chung C,Choi S,Choi Y,et a1.Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors[A].PKC2000[C].Bedm:Springer-Verlag,2000.221—234. 被引量:1
  • 9Chaum D,Damgaard I B,Van De Graff J.Multiparty Computation Ensuring Privacy of Each Party’s Input and Correctness of the Result[A].Advances in Cryptology,Proceedings of CRYPTO’87[C].Berlin:Springer—Verlag,1987.87—119. 被引量:1
  • 10毛剑,陈晓峰,王育民.一个具有隐私保护的数字产品匿名交易方案[J].西安电子科技大学学报,2002,29(5):632-634. 被引量:3

共引文献6

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部