期刊文献+

数字指纹技术的攻击方法概述 被引量:5

原文传递
导出
摘要 介绍了数字指纹的研究背景,概括了数字指纹体制的一般模型;然后主要对数字指纹的攻击进行概括;最后指出了在数字指纹抗攻击方面若干值得注意的研究方向。
出处 《计算机与信息技术》 2008年第12期69-71,共3页 Computer & Information Technology
  • 相关文献

参考文献4

二级参考文献96

  • 1B Pfitzmann,A-R Sadeghi. Anonymous fingerprinting with direct non-repudiation. In: T Okamoto. ASIACRYPT 2000. Lecture Notes in Computer Science 1976. Springer-Verlag, 2000. 401-414 被引量:1
  • 2T O kamoto,S Uchiyama. An efficient public-key cryptosystem. In: K Nyberg. Advances in Cryptology-Eurocrypt 98. Lecture Notes in Computer Science 1403. Springer-Verlag, 1998. 308-318 被引量:1
  • 3M Naor,B Pinkas. Threshold traitor tracing. In: Hugo Krawczyk. Advances in Cryptology-Crypto'98. Lecture Notes in Computer Science 1462. Springer-Verlag, 1998. 502-517 被引量:1
  • 4A Fiat,T Tassa. Dynamic traitor tracing. In: M Wiener. CRYPTO 1999. Lecture Notes in Computer Science 1666. SpringerVerlag, 1999. 354-371 被引量:1
  • 5D Boneh, M Franklin. An efficient public key traitor tracing scheme. In: M Wiener. Advances in Cryptology-Crypto99. Lecture Notes in Computer Science 1666. Springer-Verlag, 1999. 338-353 被引量:1
  • 6I Cox, J Kilian, T Leighton,T Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687 被引量:1
  • 7J Kilian, T Leighton, L R Matheson,et al. Resistance of digital watermarks to collusive attacks. Technical Report TR-58598,Departement of Computer Science, Princeton. 1998. http://citeseer. nj. nec. com/kilian98resistance. html 被引量:1
  • 8F Zane. Efficient watermark detection and collusion security. In: Y Frankel. Proc. of the 4th International Conference on Financial Cryptography(FC2000). Lecture Notes in Computer Science 1962. Springer-Verlag, 2001. 21-32 被引量:1
  • 9R Safavi-Naini, Y Wang. Collusion secure q-ary fingerprinting for perceptual content. In: T Sander. Security and Privacy in Digital Rights, ACM CCS-8 Workshop DRM 2001. Lecture Notes in Computer Science 2320. Springer-Verlag, 2002. 57-75 被引量:1
  • 10H Muratani. A collusion-secure fingerprinting code reduced by Chinese Remaindering and its random-error resilience. In: Ira S.Moskowitz. Information Hiding 2001,4th International Workshop. Lecture Notes in Computer Science 2137. Springer-Verlag,2001. 303- 被引量:1

共引文献76

同被引文献31

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部