• DocumentCode
    2145846
  • Title

    Behavior Authentication Technology Using Digital Watermark

  • Author

    Jin, Cong ; Zhang, Xiao-Liang ; Chao, Yan ; Xu, Hong-Feng

  • Author_Institution
    Dept. of Comput. Sci., Central China Normal Univ., Wuhan
  • fYear
    2008
  • fDate
    30-31 Dec. 2008
  • Firstpage
    7
  • Lastpage
    10
  • Abstract
    Digital works are considered as research focus in most existing digital copyright protection schemes. But the customers not the digital works have active aggressiveness. That is to say the customers are the fundamental reason of copyright protection problem. So customers should be monitored moreover. The existing identity authentication could verify the legitimacy of customers. But it can not distinguish the legitimacy of customer operations. In this paper, we propose an effective behavior authentication scheme for customers based on fragile watermark and multiple robust zero watermark technology. After using a digital work, the scheme can decide whether the digital work is used beyond the usage authority and determine the customer who exceeded authority further. It is known that the scheme could be applied in most situations by validity analysis. The experiment results also show that the scheme is executed efficiently and correctly.
  • Keywords
    watermarking; behavior authentication technology; digital copyright protection schemes; digital watermark; multiple robust zero watermark technology; Authentication; Computer science; Copyright protection; Data mining; Digital signatures; Image restoration; Law; Legal factors; Robustness; Watermarking; behavior authentication; copyright protection; fragile watermark; multiple robust; zero watermark;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    MultiMedia and Information Technology, 2008. MMIT '08. International Conference on
  • Conference_Location
    Three Gorges
  • Print_ISBN
    978-0-7695-3556-2
  • Type

    conf

  • DOI
    10.1109/MMIT.2008.36
  • Filename
    5089045