DocumentCode
2145846
Title
Behavior Authentication Technology Using Digital Watermark
Author
Jin, Cong ; Zhang, Xiao-Liang ; Chao, Yan ; Xu, Hong-Feng
Author_Institution
Dept. of Comput. Sci., Central China Normal Univ., Wuhan
fYear
2008
fDate
30-31 Dec. 2008
Firstpage
7
Lastpage
10
Abstract
Digital works are considered as research focus in most existing digital copyright protection schemes. But the customers not the digital works have active aggressiveness. That is to say the customers are the fundamental reason of copyright protection problem. So customers should be monitored moreover. The existing identity authentication could verify the legitimacy of customers. But it can not distinguish the legitimacy of customer operations. In this paper, we propose an effective behavior authentication scheme for customers based on fragile watermark and multiple robust zero watermark technology. After using a digital work, the scheme can decide whether the digital work is used beyond the usage authority and determine the customer who exceeded authority further. It is known that the scheme could be applied in most situations by validity analysis. The experiment results also show that the scheme is executed efficiently and correctly.
Keywords
watermarking; behavior authentication technology; digital copyright protection schemes; digital watermark; multiple robust zero watermark technology; Authentication; Computer science; Copyright protection; Data mining; Digital signatures; Image restoration; Law; Legal factors; Robustness; Watermarking; behavior authentication; copyright protection; fragile watermark; multiple robust; zero watermark;
fLanguage
English
Publisher
ieee
Conference_Titel
MultiMedia and Information Technology, 2008. MMIT '08. International Conference on
Conference_Location
Three Gorges
Print_ISBN
978-0-7695-3556-2
Type
conf
DOI
10.1109/MMIT.2008.36
Filename
5089045
Link To Document