期刊文献+

一种新的两用户合谋安全的数字指纹编码算法 被引量:1

New 2-secure Digital Fingerprinting Algorithm
下载PDF
导出
摘要 运用级联码的思想提出一种新的抗合谋数字指纹编码算法及其相应的跟踪算法.编码算法中内码采用基于混沌序列的新的二用户合谋安全码,外码采用IPP码.理论分析和实验结果表明,在合谋人数为2的情况下,该算法能对非法分发者进行有效跟踪.与Boneh-Shaw的编码算法相比,在同样的错误概率下,本算法的数字指纹编码长度得到有效缩短. Based on concatenated codes, a digital fingerprint coding and tracing algorithm is proposed. A new constructed code based on chaos is used as inner code, and IPP code is used as outer code. Both theoretical analysis and experimental results show that under the collusion size 2, by the fingerprinting algorithm, the owner can trace the traitors efficiently. Compared with Boneh-Shaw fingerprinting scheme, under the same collusion size and error probability, the algorithm shortens digital fingerprint length greatly.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第5期843-847,共5页 Journal of Chinese Computer Systems
基金 国家高技术研究发展计划项目(2007AA01Z309)资助
关键词 数字指纹 合谋攻击 混沌序列 级联码 digital fingerprints collusion attack chaos concatenated code
  • 相关文献

参考文献3

二级参考文献15

  • 1Staddon J. N. , Stinson D. R. , Wei R.. Combinatorial properties of frameproof codes and traceability codes. IEEE Transactions on Information Theory, 2001, 47(3): 1042~1049
  • 2Barg A. , Cohen G. , Encheva S. , Kabatiansky G. , Zémor G.. A hypergraph approach to the identifying parent property.SIAM Journal on Discrete Mathematics, 2001, 14(3): 423~432
  • 3Boneh D. , Shaw J. . Collusion-secure fingerprinting for digital data. Lecture Notes in Computer Science 963, Advances in Cryptology-Crypto'94, California, USA, 1995, 452~465
  • 4Beth Th. , Jungnickel D. , Lenz H.. Design Theory. Berlin:Wissenschaftsverlag, 1985
  • 5Encheva S. , Cohen G.. Some new p-ary two-secure frameproof codes. Applied Mathematics Letters, 2001, 14(2): 177~182
  • 6Hedayat A. S. , Sloane N. J. A. , Stufken John. Orthogonal Arrays Theory and Applications. New York: Springer-Verlag,1999
  • 7Encheva S. , Cohen G.. Partially identifying codes for copyright protection. In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 14th International Symposium,AAECC-14, Melbourne, Australia, 2001, 260~267
  • 8Nguyen Q. A, Lászlo Gyorfi, James L. Massey. Constructions of binary constant-weight cyclic codes and cyclically permutable codes. IEEE Transactions on Information Theory, 1992, 38(3): 940~949
  • 9Fernandez M. , Soriano. Soft-decision decoding of traceability codes. In: Proceedings of the 2002 IEEE International Conference on Multimedia and Expo (ICME2002), Lausanne,(Switzerland), 2002, 605~608
  • 10Barg A. , Blakey G. R. , Kabatiansky G.. Digital fingerpringting codes: Problems statement, constructions,identification of traitors. Technical report, DIMACS 2001-52, Rutgers University, Bush Campus, Piscataweny, 2001

共引文献6

同被引文献29

  • 1朱岩,韩心慧,叶志远,杨永田.扩频卷积指纹及其安全性分析[J].计算机学报,2006,29(6):960-968. 被引量:5
  • 2朱岩,杨永田,冯登国.合谋安全的卷积指纹信息码[J].软件学报,2006,17(7):1617-1626. 被引量:7
  • 3陈晓苏,朱大立.一种基于随机序列的数字指纹编码和跟踪算法[J].小型微型计算机系统,2007,28(5):823-825. 被引量:7
  • 4I. J. Cox,J. Kilian,F. T. Leighton, and T. Shamoon."Securespread spectrum watermarking for multimedia,"IEEE Trans. Image Process. vol. 6, no. 12,pp. 1673-1687,Dec. 1997.
  • 5Z. J. Wang,M. Wu,H. V. Zhao,andK. J. R. Liu. "Anti- collusion fbrensics of multimedia fingerprinting using orthogonal mudula- tion,"IEEE Trans. Image Process. ,vol. 14,no. 6,pp. 804-821,Jun. 2005.
  • 6H. V. Zhao,M. Wu,Z. J. Wang,andK. J. R. Liu."Fo- rensic analysis of nonlinear collusion attacks for multimedia fingerpinting, " IEEETrans. lmage Process. ,vol. 14,no. 5,pp. 646-661,May2005.
  • 7Z. Li and W. Trappe. "Collusion-resistant fingerprints from WBE sequence sets,"in Proc. IEEE Int. Conf Communications,Seoul, Korea,May 2005,pp. 1336 - 1340.
  • 8S. He and M, Wu. "Collusion-resistant video fingerprinting, for large usergroup,"IEEETrans, lnE Forensics Security,vol. 2,no. 4,pp. 697-709, 2007.
  • 9Z. J. Wang,M. Wu,W. Trappe,andK. J. R. Liu."Group- oriented fingerprinting for multimedia forensics, "EURASIP J. Appl. Sig- nal Process., no. 14,pp. 2142-2162,2004.
  • 10M. Kuribayashi. "Hierarchical spread spectrum fingerprinting scheme based on the cdma technique, "EURASIP J. Inform. Security. , no. 502782, pp. 16,2011.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部