Computer Science ›› 2012, Vol. 39 ›› Issue (4): 71-74.

Previous Articles     Next Articles

Anonymous and Traceable Copyright Protection Protocol Based on Mobile Devices

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Anonymous and traceable copyright protection protocol based on mobile devices was put forward in this pa- per. Firstly, others can not track the user by using the changing identity to replace user's true identity in the protocol. The anonymous nature exists in the protocol. Secondly, the protocol uses the method that one password only applies one fingerprint watermark so that the protocol resists the fake attack. Thirdly, while using oncway hash function to verify the identity of participators and the digital content, the protocol transfers the calculating works to the trusted center RA with enough computing ability from mobile users. I}he two behaviors reduce the mobile's calculating works, and im- prove efficiency. In addition, the copyright watermark and fingerprint watermark embedded in the digital product arc used to trace the traitor when finding one or more illegal copies of the digital product. So the protocol has the ability of traitor tracing. The analvsis indicates that the protocol is secure and practical.

Key words: Copyright watermark, Fingerprint watermark, I}raitor tracing, Copyright protection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!