In this paper, it presents a digital watermark protocol used for copy tracing.
提出了用于盗版追踪的数字水印协议。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
But more research of the digital watermarking focus on algorithms and theoretical basis, while ignoring the design of watermark application protocol and implementation.
但是目前对于数字水印的研究多集中在算法和理论基础方面,而忽视了水印的应用协议和实施标准设计和制定。
A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
基于完全零知识交互证明系统和位委托方案,提出了可证明的安全水印认证协议。
A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
基于完全零知识交互证明系统和位委托方案,提出了可证明的安全水印认证协议。
应用推荐