ASIA unversity:Item 310904400/6324
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21711002      在线人数 : 428
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/6324


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/6324


    题名: An Efficient and Fair Buyer-Seller Fingerprinting Scheme for Large Scale Networks
    作者: Chang, C. C.;Tsai, H. C.;Hsieh, Y. P.
    关键词: Fingerprinting;Buyer anonymity;Digital rights;Digital watermarking;Self-verified
    日期: 2009-08
    上传时间: 2009-12-17 06:57:19 (UTC+0)
    出版者: Asia University
    摘要: In digital watermarking, most existing schemes focus on the owners' copyright protection rather than protection of the customers' rights. Therefore, these schemes are unfair to legitimate customers who have no certificate to prove their right to use the watermarked digital content that they have purchased. In addition, these schemes are also unable to identify those who leak pirated copies of the watermarked digital content. To protect customers' rights and to identify the users of unauthorized copies, the fingerprinting technique is a feasible method for embedding a watermark so that content owners can identify users who have purchased the right to use the content and users who have not purchased this right. Although some fingerprinting schemes have been proposed in recent years, most of them are inefficient due to their homomorphic architecture that is based on public key cryptography. Therefore, in this paper, we propose a fair, traceable, and efficient watermarking scheme with a novel architecture. Due to the high computational complexity of the asymmetric cryptography, such as modular multiplications and exponentiations which lead much heavier burden than operations in symmetric cryptography, the proposed protocol transfers the demanding computational requirements from the buyer to a powerful server in protocol design. The proposed method can achieve these benefits: 1) the rights of legitimate buyers can be protected; 2) the proposed scheme is traceable; 3) the proposed scheme is more efficient than the previous schemes because public key cryptography is not frequently used; and 4) the buyer's anonymity can be well-protected until there is an infringement accusation.
    關聯: Computers & Security (Article in Press)
    显示于类别:[資訊工程學系] 期刊論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    0KbUnknown706检视/开启
    310904400-6324.doc34KbMicrosoft Word276检视/开启


    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈