The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent . the robust watermark required the authentication centre to extract the watermark . at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively 雖然本文對(duì)該模型提出的算法并沒有具體實(shí)現(xiàn),但是,在同一幅圖像中嵌入魯棒水印與易損水印的雙水印技術(shù),以及采用的非對(duì)稱密鑰體制即在水印嵌入過程與水印檢測(cè)過程中使用了一對(duì)不同的密鑰,可為人們提供一個(gè)新的思路:由于易損水印只需通過可信任第三方提取,對(duì)用戶是“可見”的,因此可根據(jù)需要嵌入不同的信息,多方利用;魯棒水印的提取需要認(rèn)證中心提取,同時(shí)可由認(rèn)證中心對(duì)商家身份進(jìn)行的零知識(shí)驗(yàn)證,體現(xiàn)了密碼學(xué)的認(rèn)證思想,更能解決版權(quán)糾紛的所有權(quán)問題。
The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent . the robust watermark required the authentication centre to extract the watermark . at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively 雖然本文對(duì)該模型提出的算法并沒有具體實(shí)現(xiàn),但是,在同一幅圖像中嵌入魯棒水印與易損水印的雙水印技術(shù),以及采用的非對(duì)稱密鑰體制即在水印嵌入過程與水印檢測(cè)過程中使用了一對(duì)不同的密鑰,可為人們提供一個(gè)新的思路:由于易損水印只需通過可信任第三方提取,對(duì)用戶是“可見”的,因此可根據(jù)需要嵌入不同的信息,多方利用;魯棒水印的提取需要認(rèn)證中心提取,同時(shí)可由認(rèn)證中心對(duì)商家身份進(jìn)行的零知識(shí)驗(yàn)證,體現(xiàn)了密碼學(xué)的認(rèn)證思想,更能解決版權(quán)糾紛的所有權(quán)問題。
And introduces the authentication centre ( ca ) for allocation and conservation of the secret key . the authentication centre uses a time-stamp, which proves the watermark embedded time and resists the interpretation attack effectively . at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication 最后,提出了一個(gè)完整的版權(quán)保護(hù)的水印框架,其中引入了分配和保存密鑰的認(rèn)證中心,該認(rèn)證中心還有提供時(shí)戳的能力,有力地證明了水印嵌入時(shí)間,能有效地抵抗解釋攻擊;同時(shí)為水印的公開化引入了可信任第三方,為商家、用戶和認(rèn)證之間提出了一個(gè)可行的規(guī)范的水印模型;并從理論上分析了該模型的抗攻擊能力。
And introduces the authentication centre ( ca ) for allocation and conservation of the secret key . the authentication centre uses a time-stamp, which proves the watermark embedded time and resists the interpretation attack effectively . at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication 最后,提出了一個(gè)完整的版權(quán)保護(hù)的水印框架,其中引入了分配和保存密鑰的認(rèn)證中心,該認(rèn)證中心還有提供時(shí)戳的能力,有力地證明了水印嵌入時(shí)間,能有效地抵抗解釋攻擊;同時(shí)為水印的公開化引入了可信任第三方,為商家、用戶和認(rèn)證之間提出了一個(gè)可行的規(guī)范的水印模型;并從理論上分析了該模型的抗攻擊能力。