期刊文献+

数字指纹编码与嵌入假设 被引量:9

Digital Fingerprinting System and Marking Assumption
下载PDF
导出
摘要 数字指纹系统是数字水印技术的一个重要分支,是用于盗版追踪的一种技术。离散指纹编码和连续指纹鳊码是数字指纹研究领域的两大阵营。本文介绍了嵌入假设对指纹编码研究的重要意义,指出这两种研究方向的主要分歧在于对待嵌入假设条件的态度不同。从嵌入假设条件出发分析了离散指纹编码和连续指纹编码的基本思路、面临的挑战和发展趋势。 Digital fingerprinting, an active area of digital watermarking, is designed to trace pirate. Discrete fingerprint and continuous fingerprint are two different branches in this area. The main divergence between them is their attitude to marking assumption, which is an important assumption in discrete fingerprint designing. From the view of marking assumption, the development and trend of both research branches are analyzed.
出处 《计算机科学》 CSCD 北大核心 2007年第11期224-228,共5页 Computer Science
关键词 数字水印 嵌入假设 共谋攻击 抗共谋指纹 Digital watermarking, Marking assumption, Collusion attack, Anti-collusion fingerprinting
  • 相关文献

参考文献20

  • 1Lin E T,Eskicioglu A M,Lagendijk R L,et al.Advances in Digital Video Content Protection.Proceedings of the IEEE,2005,93(1):171-183
  • 2Wu Min,Trappe W,Wang Z J,et al.Collusion-Resistant Fingerprinting for Multimedia.IEEE Signal Processing Magazine,March 2004.15-27
  • 3Boneh D,Shaw J.Collusion-Secure Fingerprinting for Digital Data.IEEE Trans Inform Theory,Sept.1998,44:1897-1905
  • 4Wang Z J,Wu M,Zhao H,et al.Resistance of Orthogonal Gaussian Fingerprints to Collusion Attacks.In:Proc.IEEE Int Conf.Acoustics,Speech,Signal Processing,Hong Kong,Apr.2003,724-727
  • 5Cox I J,Kilian J,Leighton F T.Secure Spread Spectrum Watermarking for Multimedia.IEEE Trans Image Processing,1997,6(12):1673-1687
  • 6Kirovski D,Mihcak M K.Bounded Gaussian Fingerprints and The Gradient Collusion Attack.ICASSP,2005.1037-1040
  • 7Wang Z J,et al.Anti-Collusion Forenscs of Multimedia Fingerprinting Using Orthogonal Modulation.IEEE Trans on Image Proc,2005,14(6):804- 821
  • 8吕述望,王彦,刘振华.数字指纹综述[J].中国科学院研究生院学报,2004,21(3):289-298. 被引量:19
  • 9Kim Won-gym,Suh Youngho.Short N-Secure Fingerprinting Code for Image.In:2004 International Conference on Image Processing (ICIP),2004.2167-2170
  • 10Domingo-Ferrer J,Herrera-Joancomarti J.Short collusion-secure fingerprints basedon dual binary Hamming codes.Electronics Letters,2000,36(20):1697-1699

二级参考文献46

  • 1B Pfitzmann,A-R Sadeghi. Anonymous fingerprinting with direct non-repudiation. In: T Okamoto. ASIACRYPT 2000. Lecture Notes in Computer Science 1976. Springer-Verlag, 2000. 401-414
  • 2T O kamoto,S Uchiyama. An efficient public-key cryptosystem. In: K Nyberg. Advances in Cryptology-Eurocrypt 98. Lecture Notes in Computer Science 1403. Springer-Verlag, 1998. 308-318
  • 3M Naor,B Pinkas. Threshold traitor tracing. In: Hugo Krawczyk. Advances in Cryptology-Crypto'98. Lecture Notes in Computer Science 1462. Springer-Verlag, 1998. 502-517
  • 4A Fiat,T Tassa. Dynamic traitor tracing. In: M Wiener. CRYPTO 1999. Lecture Notes in Computer Science 1666. SpringerVerlag, 1999. 354-371
  • 5D Boneh, M Franklin. An efficient public key traitor tracing scheme. In: M Wiener. Advances in Cryptology-Crypto99. Lecture Notes in Computer Science 1666. Springer-Verlag, 1999. 338-353
  • 6I Cox, J Kilian, T Leighton,T Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687
  • 7J Kilian, T Leighton, L R Matheson,et al. Resistance of digital watermarks to collusive attacks. Technical Report TR-58598,Departement of Computer Science, Princeton. 1998. http://citeseer. nj. nec. com/kilian98resistance. html
  • 8F Zane. Efficient watermark detection and collusion security. In: Y Frankel. Proc. of the 4th International Conference on Financial Cryptography(FC2000). Lecture Notes in Computer Science 1962. Springer-Verlag, 2001. 21-32
  • 9R Safavi-Naini, Y Wang. Collusion secure q-ary fingerprinting for perceptual content. In: T Sander. Security and Privacy in Digital Rights, ACM CCS-8 Workshop DRM 2001. Lecture Notes in Computer Science 2320. Springer-Verlag, 2002. 57-75
  • 10H Muratani. A collusion-secure fingerprinting code reduced by Chinese Remaindering and its random-error resilience. In: Ira S.Moskowitz. Information Hiding 2001,4th International Workshop. Lecture Notes in Computer Science 2137. Springer-Verlag,2001. 303-

共引文献18

同被引文献61

  • 1朱岩,韩心慧,叶志远,杨永田.扩频卷积指纹及其安全性分析[J].计算机学报,2006,29(6):960-968. 被引量:5
  • 2朱长青,杨成松,李中原.一种抗数据压缩的矢量地图数据数字水印算法[J].测绘科学技术学报,2006,23(4):281-283. 被引量:34
  • 3陈晓苏,朱大立.一种基于随机序列的数字指纹编码和跟踪算法[J].小型微型计算机系统,2007,28(5):823-825. 被引量:7
  • 4Boneh D,Shaw J.Collusion-secure fingerprinting for digital data[J].IEEE Transactions.On Inform.Theory,1998,44(5):1897-1905.
  • 5Cox I J,Killian J,Leighton T.Secure Spread Spectrum Watermarking for Multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673-1687.
  • 6He S,Wu M.Joint Coding and Embedding Techniques for Multimedia Fingerprinting[J].IEEE Transactions on Information Forensics and Security,2006,1(2):231-246.
  • 7Kiyavash N,Moulin P.Regular simplex fingerprints and their optimality properties[C]//Proceeding.of IWDW,2005:97-109.
  • 8Wang Z J,Wu M,Zhao H,et al.Anti-Collusion Forensics of Multimedia Fingerprinting Using Orthogonal Modulation[J].IEEE Transactions on Image Processing,2005,14(6):804-821.
  • 9Kim W,Suh Y.Short N-secure Fingerprinting Code for Image[C]//Proceeding of ICIP,2004:2167-2170.
  • 10Pan Guangyi,Li Xiaoqiang,Li Wei.Optimal Focused Fingerprints from Orthogonality[C]//International Conference on Audio,Language and Image,2008,2:1640-1644.

引证文献9

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部