Computer Science ›› 2012, Vol. 39 ›› Issue (4): 71-74.
Previous Articles Next Articles
Online:
Published:
Abstract: Anonymous and traceable copyright protection protocol based on mobile devices was put forward in this pa- per. Firstly, others can not track the user by using the changing identity to replace user's true identity in the protocol. The anonymous nature exists in the protocol. Secondly, the protocol uses the method that one password only applies one fingerprint watermark so that the protocol resists the fake attack. Thirdly, while using oncway hash function to verify the identity of participators and the digital content, the protocol transfers the calculating works to the trusted center RA with enough computing ability from mobile users. I}he two behaviors reduce the mobile's calculating works, and im- prove efficiency. In addition, the copyright watermark and fingerprint watermark embedded in the digital product arc used to trace the traitor when finding one or more illegal copies of the digital product. So the protocol has the ability of traitor tracing. The analvsis indicates that the protocol is secure and practical.
Key words: Copyright watermark, Fingerprint watermark, I}raitor tracing, Copyright protection
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2012/V39/I4/71
Cited