免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2974 | 回复: 1
打印 上一主题 下一主题

谁有它的密码? [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2005-04-27 14:37 |只看该作者 |倒序浏览
ISC2 CISSP Study Guide 2003 - Password CISSPSG2003.pdf

论坛徽章:
0
2 [报告]
发表于 2005-05-27 09:38 |只看该作者
There are several attacks in current digital watermark system. In first case,\r\nwe can suppose that Alice and Bob use the same digital watermarking technique\r\nto watermark and there is one unique decoding scheme to extract the labels\r\nembedded in the images. In this case, if a watermarked image contains both\r\nAlice and Bob’s signatures, how can we decide the originality of this marked\r\nimage? And we also think another scenario. Let’s suppose that Alice and Bob\r\nuse different watermarking techniques. And Given a watermarked image, Alice\r\ncan take this image and decode the label using her decoding scheme. Similarly\r\nBob can perform the label extraction process with his decoding scheme. If Alice’s\r\ndecoder indicates that the image belongs to her while Bob’s decoder indicates\r\nthat it is his image, then how can we decide the ownership of this marked image?\r\nIn these two cases, rightful ownership cannot be resolved by invisible watermarks\r\nalone. They present in detail a counterfeit watermarking scheme that allows\r\nmultiple claims of ownerships.\r\nUndeniable watermark differ from ordinary digital watermark in that the\r\nverifier should be unable to distinguish between valid and invalid watermark.\r\nBut, original watermarker can change it into correct one. If the message in is\r\ncopyright owner’s information, the scheme can be non-invertible. And we can also\r\nintroduce zero-knowledge based watermarking mechanism. Using zero-knowledge\r\nprotocols[3], watermarks can be made public enough to be detected yet private\r\nenough to be unremovable. i.e., watermarking scheme in which the watermark’s\r\npresence can be verified without ever revealing enough information to remove\r\nthe mark.\r\nDesignated Verification of Digital Watermark 1071\r\nWe first present the overall digital watermark mechanism and review the\r\nexisting model in section 2. We then consider re-watermarking attack and its\r\npossible solution in section 3. And then we propose designated verification process\r\nwith commitment scheme in section 4. Furthermore, we discuss the proof\r\nof ownership in section 5 and conclude this study with the consideration of the\r\nfuture works in final section.
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP