[1] 钮心忻. 信息隐藏与数字水印[M]. 北京: 北京邮电大学出版社, 2004. [2] Lin E T, Eskicioglu A M, Lagendijk R L, et al. Advances in digital video content protection[J]. Proceedings of the IEEE, 2005, 93(1): 171-183. [3] Mandal P, Thakral A, Verma S. Watermark based digital rights management//Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC'05). 2005: 74-78. [4] Open Mobile Alliance(OMA). Open mobile alliance: DRM architecture draft version 2.0-20 August 2004. 2004(2004-08-27). http://www.openmobilealliance.com. [5] 刘立刚, 陈晓苏, 胡蕾, 抗协议攻击的版权保护安全方案[J]. 中山大学学报, 2004, 43(2): 83-86. Liu Ligang, Chen Xiaosu, Hu Le. Digital copyright protection security schemes against protocol attacks[J]. ACTA Scientiarum Naturalium Universitatis Sunyatseni, 2004, 43(2): 83-86. [6] Sadeghi A R, Stuble C. Towards multilateral-secure DRM platforms//ISPEC 2005. Berlin: Springer-Verlag, 2005: 326-337. [7] Trusted Computing Group. Trusted computing platform alliance main specification. 2003(2003-08-01). http://www.trusted-computinggroup.org. [8] Felten Edward W. DRM and public policy[J]. Communications of the ACM, 2005, 48(7): 112. [9] Furon T, Duhamel P. An asymmetric watermarking method[J]. IEEE Transactions on Signal Processing, 2003, 51(4): 981-995. [10] Chang Fengcheng, Huang Hsiangcheh, Hang Hsuehming. Layered access control schemes on watermarked scalable media//Circuits and Systems, ISCAS 2005. Kobe: IEEE CAS Society, 2005: 4983-4986. [11] Voloshynovskiy S, Pereira S, Pun T, et al. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks[J]. Communications Magazine, IEEE, 2001, 39(8): 118-126. [12] Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications[J]. Selected Areas in Communications, IEEE Journal on, 1998, 16(4): 573-586. [13] 冯登国. 可证安全性理论与方法[J]. 软件学报, 2005, 16(10): 1743-1756. Feng Dengguo. Research on theory and approach of provable security[J]. Journal of Software, 2005, 16(10): 1743-1756. [14] Cheng Zhaohui, Vasiu L, Comely R. Pairing-Based One-Round Tripartite Key Agreement Protocols. 2004. http://eprint.iacr.org/. [15] 袁中兰, 夏光升, 温巧燕, 等. 数字作品著作权保护协议[J]. 北京邮电大学学报, 2005, 28(1): 19-22. Yuan Zhonglan, Xia Guangsheng, Wen Qiaoyan, et al. Copyright protection protocol for digital media[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 19-22. |