Provable secure digital watermarking scheme
A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the wat...
Saved in:
Format: | Article |
---|---|
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74332870/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537522165874688 |
---|---|
collection | DOAJ |
description | A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency. |
format | Article |
id | doaj-art-2deb9e302fc44090b7104a837f12e1ed |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2deb9e302fc44090b7104a837f12e1ed2025-01-14T08:30:52ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01919674332870Provable secure digital watermarking schemeA novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.http://www.joconline.com.cn/zh/article/74332870/DRMwatermarking schemewatermarking protocol attackprovable securityRO mode |
spellingShingle | Provable secure digital watermarking scheme Tongxin xuebao DRM watermarking scheme watermarking protocol attack provable security RO mode |
title | Provable secure digital watermarking scheme |
title_full | Provable secure digital watermarking scheme |
title_fullStr | Provable secure digital watermarking scheme |
title_full_unstemmed | Provable secure digital watermarking scheme |
title_short | Provable secure digital watermarking scheme |
title_sort | provable secure digital watermarking scheme |
topic | DRM watermarking scheme watermarking protocol attack provable security RO mode |
url | http://www.joconline.com.cn/zh/article/74332870/ |