期刊文献+

数字水印的解释攻击与关联性特征研究

Study on the Interpretation Attack of Digital Watermarking and Its Relating Characteristics
下载PDF
导出
摘要 数字水印作为一种版权保护技术已经成为目前的研究热点,引起了越来越多的关注.但是,对于数字水印的攻击也在不断的出现,其中以解释攻击(IBM攻击)最为危险.文章通过对解释攻击进行分析,首次提出了水印的关联性特征对水印嵌入进行规范,并提出了借助于第三方机构和信息的包容关系两种构造水印关联性特征的方法.通过对利用信息包容关系的方法进行测试,我们认为如果所有水印嵌入都能够遵守水印关联性特征,那么就可以解决解释攻击的问题. Digital watermarking has been the hotspot of international academia in the domain of information security. With the development of digital watermarking more and more attacks on it appeared, interpretation attack is the most dangerous attack of them. In this paper, after analyzing the interpretation attack, we first put forward the relating characteristic to rule the embedding. In addition, we propose two ways to create relating characteristic, one relys on the third party, the other bases on the interrelation of information. After testing the second way, we conclude that if all embeddings abide by the principles, the interpretation attack could be resolved.
作者 李维仙
出处 《廊坊师范学院学报》 2004年第4期34-38,共5页 Journal of Langfang Teachers College
关键词 数字水印 解释攻击 关联性特征 digital watermarking interpretation attack relating characteristic
  • 相关文献

参考文献9

  • 1[1]Alexander herrigel , Sviatoslav voloshynovskiy , Yuriy rystar."The watermark template attack"[J].Proceedings of the SPIE Security and Watermarking of Multimedia Contents III , vol. 4314 ,394-405 , San Jose,January 22-25 , 2001.
  • 2[2]Reka Major , Valentin Deac , Monica Borda."An application of the hash functions in digital watermarking"[J].《 http://193.226.6.174/IT2002/pdf/L16.pdf 》
  • 3[3]A.Nikolaidis , S.Tsekeridou , A.Tefas , V.Solachidis."A survey on watermarking application scenarios and related attacks"[J].Image Processing , 2001, Proceedings. 2001.
  • 4[4]Karen su , Eeepa Kundur and Dimitrios Hatzinakos."A Novel Approach to Collusion-resistant Video Watermarking "[J].《 http://ee.tamu.edu/~deepa/pdf/4675-53.pdf 》.
  • 5[5]M.kutter , F.A.peticolas."A fair benchmark for image watermarking systems"[J].Proc. SPIE Security and watermarking of Multimedia Contents , San Jose , CA, USA, Jan. 1999, vol. 3657,226-239.
  • 6[6]J.D.Gordy and L.T.Bruton."Performance evaluation of digital audio watermarking algorithms"[J].《 http://www-mddsp.enel.ucalgary.ca/People/gordy/MWSCAS.PDF 》.
  • 7[7]Fabien A.P.Petitcolas , Microsoft Research."Watermarking schemes evaluation"[J].I.E.E.E. Signal Processing, vol. 17, no. 5,58-64, September 2000.
  • 8[8]Ingemar J.cox , Matt L.Miller and Jeffrey A.Bloom Nec research institute."Watermarking applications and their properties"[J].Proc. of Int. Conf. on Information Technology: Coding and Computing 2000, 2729 March 2000,6-10.
  • 9尹萍,刘振华.数字水印中的解释攻击及其解决方案[J].计算机应用研究,2001,18(4):12-15. 被引量:5

二级参考文献5

  • 1[1]Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Information Hiding-A Survey[J]. Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999, 87(7): 1062-1078.
  • 2[2]Ross J Anderson, Fabien A P Petitcolas. On the Limits of Steganography[J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 474-481.
  • 3[3]David Aucsmith. Attacks on Copyright Marking Systems[J]. Second Workshop on Information Hiding, in vol.1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 April, 1998, 218-238.
  • 4[4]Scott Craver, Nasir Memon, Boon-Lock Yeo, Minerva M Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications[J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 573-586.
  • 5[5]Bruce Schneier. Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C[M]. Hohn Wiley & Sons, Inc., 1996.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部