By Topic

Behavior Authentication Technology Using Digital Watermark

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Cong Jin ; Dept. of Comput. Sci., Central China Normal Univ., Wuhan ; Xiao-Liang Zhang ; Yan Chao ; Hong-Feng Xu

Digital works are considered as research focus in most existing digital copyright protection schemes. But the customers not the digital works have active aggressiveness. That is to say the customers are the fundamental reason of copyright protection problem. So customers should be monitored moreover. The existing identity authentication could verify the legitimacy of customers. But it can not distinguish the legitimacy of customer operations. In this paper, we propose an effective behavior authentication scheme for customers based on fragile watermark and multiple robust zero watermark technology. After using a digital work, the scheme can decide whether the digital work is used beyond the usage authority and determine the customer who exceeded authority further. It is known that the scheme could be applied in most situations by validity analysis. The experiment results also show that the scheme is executed efficiently and correctly.

Published in:

MultiMedia and Information Technology, 2008. MMIT '08. International Conference on

Date of Conference:

30-31 Dec. 2008