期刊文献+

一种基于树结构的高斯分布扩频指纹嵌入技术的方法研究 被引量:3

Research on Method for Spread Spectrum Fingerprints Embedding Following Gaussian Based Tree-Structure
下载PDF
导出
摘要 数字指纹是目前保护多媒体内容不受非法拷贝分配的最新技术。一定条件下,多媒体拷贝内容能够有效跟踪非法用户并抗击共谋攻击是其应用的关键技术。在多播环境下,考虑带宽影响研究了一种基于树结构的扩频指纹嵌入系统。该系统在高斯分布情况下,对一定的共谋攻击者,系统俘获其的概率比正交扩频指纹系统提高了约40%,从而增强了追踪非法用户的能力,进一步提高了指纹加密系统的鲁棒性。 Digital fingerprint is a new technology to protect multimedia content from illegal copies and redistribution. Under stringent constraints, it is crucial that fingerprinted multimedia copies can resistance collusion attacks in streaming applications. The spread spectrum fingerprints embedding is researched based on tree-structure at muhicast following Gaussian with bandwidth requirement. Compared with orthogonal spread spectrum fingerprints embedding technology, the system will be increase of 40% for the probability of capturing colluders depending on the number of users. Therefore, the system improves performance for tracing colluders and further achieves robustness against collusion attacks.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第1期42-45,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 广东省自然科学基金资助项目(04105503) 佛山市科技发展专项基金资助项目(04010052)
关键词 树结构 扩频 高斯分布 指纹系统 多媒体视频流 tree-structure spread spectrum Gaussian distribution fingerprinting system multimedia video streaming
  • 相关文献

参考文献6

  • 1张峰,穆晓敏,杨守义.数字指纹技术的研究进展[J].电讯技术,2005,45(5):5-10. 被引量:6
  • 2WANG Z.Jane,WU M,ZHAO H,et al.Ray.Resistance of orthogonal Gaussian fingerprints to collusion attacks[A].IEEE International Conference on Acoustics,speech & Signal Processing[C],2003:6-10.
  • 3赵慧民.一种用于DRM的指纹嵌入和解密集成的实现方法研究[J].电路与系统学报,2005,10(5):71-75. 被引量:1
  • 4COX I,KILLIAN J,LEIGHTON F,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans.onImage Processing,1997,6(12):1673-1687.
  • 5TRAPPE W,WU M,WANG Z,et al.Anti-collusion figerprinting for multimedia[J].IEEE Tran on Signal Proc,2003,51(4):1069-1087.
  • 6WANG Z J,WU M,TRAPPE W,et al.Group-oriented fingerprinting for multimedia forensics[M].To Appear in EURASIP Journal on Applied Signal Processing,2004.

二级参考文献36

  • 1B M Macq, J J Quisquater. Crytology for Digital TV broadcasting [J]. Proc. IEEE, 1995-06, 83: 944-957.
  • 2J Bloom. Security and rights management in digital cinema [A]. Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing [C]. 2003-04, 4: 712-715.
  • 3R Anderson, C Manifavas. Chameleon-A new kind of stream cipher [R]. Lecture Notes in Computer Science, Fast Software Encryption, E Biham, Ed Heidelberg, Germany: Springer-Verlag, 1997. 107-113.
  • 4Chang Y, Han R, Li C, J Smith. Secure transcoding of internet content [A]. Proc. Int. Workshop Intelligent Multimedia Computing and Networking (IMMCN) [C].2004. 940-943.
  • 5J Dittmann, A Behr, M Stabenau, et al. Combining digital watermarkings and collusion secure fingerprints for digital image [A]. In proc. SPIE. Conf. Electronic Imaging'99, Security and Watermarking of Multimedia Contents [C]. 1999, 41: 171-182.
  • 6F Hartung, B Girod. Digital Watermarking of MPRG-2 coded Video in the bit stream domain [A]. Proc. Int. Conf. Acoustics, Speech and Signal Processing [C]. 1997, 4: 2621-2624.
  • 7D Boneh, J Shaw. Collusion-secure fingerprinting for di gital data [J]. IEEE Trans. Inform. Theory, 1998-09, 44: 1897-1905.
  • 8W Trappe, Wu M, Liu K J R. Collusion-resistant fingerprinting for multimedia [A]. Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing [C]. 2002, 4: 3309-3312.
  • 9W Trappe, Wu M, Wang Z J, et al. Anti-collusion fingerprinting for multimedia [J]. IEEE Trans. Signal Processing,.2003-04, 51: 1069-1087.
  • 10S Katzenbeisser,F A P Petitcolas.Information Hiding:Techniques for Steganography and Digital Watermarking[M].MA:Artech House,2000.

共引文献5

同被引文献25

  • 1赵慧民.指纹采集系统与DSP快速处理技术[J].固体电子学研究与进展,2004,24(3):337-342. 被引量:5
  • 2杨建波,陈贺新,王选贺.基于Opt-rec多小波数字水印嵌入新方法[J].计算机工程与应用,2004,40(36):33-34. 被引量:2
  • 3赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印[J].中国科学(E辑),2006,36(2):137-152. 被引量:14
  • 4JOSEPH J K, RUANAIDH O, THIERRY PUN. Rotation, scale and translation invariant spread spectrum digital im- age watermarking [ J ]. Signal Processing, 1998, 66 (3) : 303 -317.
  • 5COX J, MILLER L, MCKELLIPS L. Watermarking as communications with side information [ J]. Roceedings of the IEEE, 1999,87(7) :1127 - 1140.
  • 6MOULIN P. The role of information theory in watermark- ing and its application to image watermarking [ J ]. Signal Processing, Special Issue on Information Theoretic issues in Digital Watermarking, 2001, 81 (6) :1121 - 1139.
  • 7MOULIN P, LIU J. Analysis of multiresolution image de- noising schemes using generalized - gaussian and com- plexity priors [ J ]. IEEE Trans on Information Theory, 1999,45(3) : 909 -919.
  • 8SULLIVAN K, MADHOW U, CHANDRASEKARAN S, and MANJUNATH B S. Steganalysis of spread spectrum data hiding exploiting cover memory [ C ] // SPIE2005, 2005,5681:38 - 46.
  • 9WANG L Y,CUI L R, CHEN W, et al. Availability of Markov repairable systems with changeable operating regimes[ C]//IEEE the 17th International Conference on Industrial Engineering and Engineering Management, 2010 : 924 - 926.
  • 10BATU T, GUHA S, KANNAN S. Inferring mixtures of Markov chains [ R]. In ACM Symposium on Theory of Computing, 2006 : 247 - 257.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部