期刊文献+

基于安全水印的三方交易系统

Tripartite Trade System Based on Secure Watermarking
下载PDF
导出
摘要 针对电子商务中三方交易存在的问题,提出基于安全水印的三方交易系统.在买卖方水印协议中加入第3方,卖方将所拥有的图像委托给服务器,让服务器与买方进行交易.首先依靠同态加密和扩频,在卖方的原始图像中嵌入服务器的水印,并将含水印的图像发送给服务器.服务器接收到图像后,先通过扩频抖动调制嵌入用于追踪非法传播时锁定可疑买方的定位水印,然后与买方执行基于同态加密的买卖方水印协议.在电子商务平台三方交易中,基于安全水印的三方交易系统不仅可保证服务器和买方不被陷害,而且可追踪非法传播的买方或服务器,为大用户群提供安全交易方案. To ensure security of e-commerce, we propose a tripartite trade system based on secure watermarking. We add a third party (server) in the buyer-seller watermarking protocol. The seller sends his/her own image to the server, and let the server trade with the buyer. The seller first uses homomorphic encryption and spreading to embed the server's watermark in the original image and send the marked image to the server. Having received the marked image, the server uses spread-spectrum dither modulation to embed another watermark to be used for locating suspicious buyers who illegally distribute the image. The server then executes the buyer-seller watermarking protocol based on homomorphic encryption. In the tripartite trade of the e-commerce platform, the proposed system not only prevents both the server and buyer from being framed, but also can trace illegal distribution of any buyer or the server. The system also provides a solution to the secure online transactions for a large number of users.
出处 《应用科学学报》 CAS CSCD 北大核心 2015年第6期575-584,共10页 Journal of Applied Sciences
基金 国家自然科学基金(No.61572308) 上海市青年科技启明星人才计划基金(No.14QA1401900)资助
关键词 买卖方水印协议 同态加密 三方交易 安全水印 buyer-seller watermarking protocol, homomorphic encryption, tripartite trade,secure watermark
  • 相关文献

参考文献19

  • 1Mohaghegh H, Karimin, Samavi H. Framework for watermark robustness adjustment using image depth map[C]//Iranian Conference on Electrical Engineering (ICEE), 2015:555-560.
  • 2Lin W, Zhao H, Liu K. Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks[J]. IEEE Transaction on Multimedia, 2011, 2(13):191-205.
  • 3Bianchi T, Piva A. TTP-free asymmetric fingerprinting protocol based on client side embedding[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10):1577-1568.
  • 4Bianchi T, Piva A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2):87-96.
  • 5Pfitzmann B, Schunter M. Asymmetric fingerprinting[J]. Advances in Cryptology-Eurocrypt, 1996, 5(12):84-95.
  • 6Terelius B. Towards transferable watermarks in buyer-seller watermarking protocols[C]//IEEE International Workshop on Information Forensics and Security (WIFS), 2013:197- 202.
  • 7Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4):643-649.
  • 8Zhang X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
  • 9Ibrahim I M, El-Din S H N, Hegazy A F A. An effective and secure buyer-seller water-marking protocol[C]//Third Intemational Symposium of Information Assurance and Seaunity, 2007:21- 28.
  • 10Paillier P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt 1999. New York:Springer, 1999, 1592:223-238.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部