DocumentCode :
2145846
Title :
Behavior Authentication Technology Using Digital Watermark
Author :
Jin, Cong ; Zhang, Xiao-Liang ; Chao, Yan ; Xu, Hong-Feng
Author_Institution :
Dept. of Comput. Sci., Central China Normal Univ., Wuhan
fYear :
2008
fDate :
30-31 Dec. 2008
Firstpage :
7
Lastpage :
10
Abstract :
Digital works are considered as research focus in most existing digital copyright protection schemes. But the customers not the digital works have active aggressiveness. That is to say the customers are the fundamental reason of copyright protection problem. So customers should be monitored moreover. The existing identity authentication could verify the legitimacy of customers. But it can not distinguish the legitimacy of customer operations. In this paper, we propose an effective behavior authentication scheme for customers based on fragile watermark and multiple robust zero watermark technology. After using a digital work, the scheme can decide whether the digital work is used beyond the usage authority and determine the customer who exceeded authority further. It is known that the scheme could be applied in most situations by validity analysis. The experiment results also show that the scheme is executed efficiently and correctly.
Keywords :
watermarking; behavior authentication technology; digital copyright protection schemes; digital watermark; multiple robust zero watermark technology; Authentication; Computer science; Copyright protection; Data mining; Digital signatures; Image restoration; Law; Legal factors; Robustness; Watermarking; behavior authentication; copyright protection; fragile watermark; multiple robust; zero watermark;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MultiMedia and Information Technology, 2008. MMIT '08. International Conference on
Conference_Location :
Three Gorges
Print_ISBN :
978-0-7695-3556-2
Type :
conf
DOI :
10.1109/MMIT.2008.36
Filename :
5089045
Link To Document :
بازگشت