Trading, identifying and arbitraging method, system and equipment based on watermark technology
A technology of watermarking technology and transaction method, which is applied in the field of digital copyright management, can solve problems such as low information bit rate, practical application limitations, high complexity, etc., and achieve good perception effect, great robustness, and reduced complexity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] see figure 1 , is a flow chart of the transaction method based on the watermark technology provided by the embodiment of the present invention. The embodiment of the present invention provides a transaction method based on watermark technology, the specific steps are as follows:
[0073] First make the following assumptions:
[0074] I) Public key infrastructure is well deployed, so each party to the protocol has a public-private key pair and a digital certificate issued by a trusted CA. In this way, it can be assumed that each party to the communication can authenticate the other, and any two-party communication is secure;
[0075] II) The encryption function E is an embedding operation privacy homomorphism. In addition, before the buyer B and the seller S conduct a transaction, B needs to apply for an anonymous certificate Cert from the CA CA (pk B ). In this way, pk B It can be used not only as B's public key, but also as B's identity.
[0076] Step 101: Th...
Embodiment 2
[0091] see figure 2 , is a flow chart of the authentication and arbitration method based on the watermark technology provided by the embodiment of the present invention. The embodiment of the present invention provides an authentication and arbitration method based on watermark technology. When S discovers an illegal copy Y of X, the method provided by the embodiment of the present invention can be used to find the true identity of the responsible distributor. Specific steps are as follows:
[0092] Step 201: The seller S watermarks the public key pk of the authority WCA WCA Encrypt illegal copy Y and purchased content X respectively to get E pk WCA ( Y ) , E pk WCA ( X ) .
[0093] Wherein, the calculation method used in enc...
Embodiment 3
[0109] see image 3 , is a schematic diagram of a transaction system based on watermark technology provided by an embodiment of the present invention. The embodiment of the present invention provides a transaction system based on watermarking technology, the system includes: a buyer's device 301, a seller's device 302 and a watermarking authority 303, wherein,
[0110] The purchaser device 301 is configured to send a request message, where the request message includes the purchaser's anonymous certificate, the agreement and the purchaser's signature on the agreement;
[0111] The seller's device 302 is used to receive the request message sent by the buyer's device 301, send a watermark request message including the content of the received request message to the watermark authority, and is also used to obtain the encrypted watermark from the watermark authority 303, and convert the encrypted watermark to the watermark authority. Perform watermark embedding in the encryption do...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 