期刊文献+

抗可逆性攻击和嵌入器攻击的安全水印系统 被引量:2

Secure Watermarking System Capable of Resisting Invertibility and Inserter Attacks
下载PDF
导出
摘要 提出了可以同时抵抗可逆性攻击和嵌入器攻击的安全水印系统。此系统由协议和算法两个部分组成:水印协议由权威机构颁布,规定了合法水印嵌入及检测的框架;水印算法由嵌入者自行选择或设计。该水印系统将处于不同层次的抗可逆性攻击水印协议与抗嵌入器攻击水印算法结合在一起,另外借鉴了迭加一次伪随机序列负载多比特信息的思想,将单比特水印系统扩展为多比特系统。 A secure watermarking system capable of resisting invertibility and inserter attacks is proposed. The proposed watermarking system is made up of two parts: a protocol issued by an authoritative organization, which defines a framework of watermark embedding and detection, and an algorithm chosen or designed by a copyright owner. While the protocol can defeat invertibility attacks, the algorithm ensures that any attack based on availability of inserter is impossible to succeed. By using a previously introduced technique in which each sequence can carry more than one bit without additional distortion, the proposed method can be expanded to a multiple_bit system.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第A02期10-13,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(60372090) 上海市教委青年基金资助项目
关键词 数字水印 可逆性攻击 嵌入器攻击 digital watermarking invertibility attack inserter attack
  • 相关文献

参考文献10

  • 1ZHANGX,WANGS,ZHANGK.Multi_bitwatermarkingschemebasedonadditionoforthogonalsequences[].ComputerNetworkSecurity.2003
  • 2KATZENBEISSERS,VEITHH.Securingsymmetricwatermarkingschemesagainstprotocolattacks[].SecurityandWatermarkingofMultimediaContentsⅣ.2002
  • 3PETTITCOLAS F A P,ANDERSON R J,KUHN M G.Information hiding? A survey[].Proceedings of the IEEE.1999
  • 4COX I J,LINNARTZ J M G.Some general methods for tampering with watermarks[].IEEE Journal of Selected Areas in Communications.1998
  • 5VOLOSHYNOVSKIY S,PEREIRA S,PUN T,et al.Attacks on digital watermarking: classification, estimation_based attacks, and benchmarks[].IEEE Communications Magazine.2001
  • 6CRAVER S,MEMON N,YEO B,et al.Resolving rightful ownerships with invisible watermarking techniques:limitations, attacks, and omplications[].IEEE Journal of Selected Areas in Communications.1998
  • 7Zhang X,Wang S.Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure[].Pattern Recognition.2004
  • 8ZHANG X,WANG S.Watermarking scheme capable of resisting attacks based on availability of inserter[].Signal Processing.2002
  • 9HWANG M S,CHANG C C,HWANG K F.A watermarking technique based on one_way hash functions[].IEEE Transactions on Consumer Electronics.1999
  • 10BLOOM J A,COX I J,KALKER T,et al.Copy protection for DVD video[].Proceedings of the IEEE.1999

同被引文献22

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部