the way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent . the robust watermark required the authentication centre to extract the watermark . at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively 虽然本文对该模型提出的算法并没有具体实现,但是,在同一幅图像中嵌入鲁棒水印与易损水印的双水印技术,以及采用的非对称密钥体制即在水印嵌入过程与水印检测过程中使用了一对不同的密钥,可为人们提供一个新的思路:由于易损水印只需通过可信任第三方提取,对用户是“可见”的,因此可根据需要嵌入不同的信息,多方利用;鲁棒水印的提取需要认证中心提取,同时可由认证中心对商家身份进行的零知识验证,体现了密码学的认证思想,更能解决版权纠纷的所有权问题。
the way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent . the robust watermark required the authentication centre to extract the watermark . at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively 虽然本文对该模型提出的算法并没有具体实现,但是,在同一幅图像中嵌入鲁棒水印与易损水印的双水印技术,以及采用的非对称密钥体制即在水印嵌入过程与水印检测过程中使用了一对不同的密钥,可为人们提供一个新的思路:由于易损水印只需通过可信任第三方提取,对用户是“可见”的,因此可根据需要嵌入不同的信息,多方利用;鲁棒水印的提取需要认证中心提取,同时可由认证中心对商家身份进行的零知识验证,体现了密码学的认证思想,更能解决版权纠纷的所有权问题。
and introduces the authentication centre ( ca ) for allocation and conservation of the secret key . the authentication centre uses a time-stamp, which proves the watermark embedded time and resists the interpretation attack effectively . at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication 最后,提出了一个完整的版权保护的水印框架,其中引入了分配和保存密钥的认证中心,该认证中心还有提供时戳的能力,有力地证明了水印嵌入时间,能有效地抵抗解释攻击;同时为水印的公开化引入了可信任第三方,为商家、用户和认证之间提出了一个可行的规范的水印模型;并从理论上分析了该模型的抗攻击能力。
and introduces the authentication centre ( ca ) for allocation and conservation of the secret key . the authentication centre uses a time-stamp, which proves the watermark embedded time and resists the interpretation attack effectively . at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication 最后,提出了一个完整的版权保护的水印框架,其中引入了分配和保存密钥的认证中心,该认证中心还有提供时戳的能力,有力地证明了水印嵌入时间,能有效地抵抗解释攻击;同时为水印的公开化引入了可信任第三方,为商家、用户和认证之间提出了一个可行的规范的水印模型;并从理论上分析了该模型的抗攻击能力。