期刊文献+

高效的数字指纹方案 被引量:1

Efficient digital fingerprinting scheme
下载PDF
导出
摘要 为了提高指纹方案的编码效率并减少存储空间,提出一种新的指纹方案。该方案将多元线性分组码每个码元对应的正交序列串接起来构成用户的指纹。与正交编码指纹和基于均衡不完全区组设计(BIBD)编码的正交指纹相比,编码效率有了一定的提高,单位指纹所需的存储空间降低到O(logn)。理论分析和实验均表明,该方案具有很好的抗合谋性能和鲁棒性。 To improve the performance of coding efficiency and reduce storage space, a new fingerprinting scheme was proposed. First, muhiple linear block codes were designed, and then orthogonal vector of each symbol was connected to form user's fingerprinting. Compared with the orthogonal coding fingerprinting and orthogonal fingerprinting based on Balanced Incomplete Block Design ( BIBD), the proposed scheme improves coding efficiency to some extent and reduces storage space to 0( log n) for each fingerprinting. The theoretical analysis and the experimental results show that the approach is of robustness, and has good anti-collusion performance.
出处 《计算机应用》 CSCD 北大核心 2010年第10期2684-2686,2690,共4页 journal of Computer Applications
关键词 数字指纹 正交编码 编码效率 均衡不完全区组设计 digital fingerprinting orthogonal coding coding efficiency Balanced Incomplete Block Design (BIBD)
  • 相关文献

参考文献6

  • 1COXI J, KILIAN J, LEIGHTONZ T, et al. Secure spread spectrum watermarking for multimedia [ J]. IEEE Transactions on Image Processing, 1997, 6 (12) : 1673 - 1687.
  • 2TRAPPE W, WU M, WANG Z, et al. Anti-collusion fingerprinting for multimedia [ J]. IEEE Transactions Signal Processing, 2003, 51(4): 1069-1087.
  • 3WU Y D, ZHAO G. Collusion attack to a scalable AND-ACC fingerprinting scheme [ EB/OL]. [2010 -02 - 10]. http://icsd, i2r. a-star, edu. sg/staff/yongdong/papers/wuyongdong VCIP2007. pdf.
  • 4WANG Z, WU M, ZHAO H V, et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation [ J]. IEEE Transactions on Image Processing, 2005, 14(6) : 804 -821.
  • 5HOU S, UEHARA T, MORIMURA Y, et al. Fingerprinting codes for live pay-television broadcast via Internet [ C]// MCAM 2007: Proceeding of 2007 Multimedia Content Analysis and Mining. Berlin: Springer, 2007:252-261.
  • 6PODILCHUK C I, ZENG WENJUN. Image - adaptive watermarking using visual models [ J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525 -539.

同被引文献6

  • 1Boneh D ,Shaw J.Collusion-secure fingerprinting for digital data[J].IEEE Trans on hdormation Theory, 1998,44(5):1897-1905.
  • 2Tardos G.Optimal probabilistic fingerprint codes[C]//Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), 2003:116- 125.
  • 3Hagiwara M,Hanaoka G,Imai H.A Short Random Finger-printing Code Against a Small Number of Pirates[C]//ser. Lecture Notes in Computer Science.Fossorier M..Berlin, Germany:Springer-Verlag, 2006,3857:193-202.
  • 4Isogai T,MurataniH.Tardos's fingerprint code shortened by optimizing code generation probabilities and improving tracing algorithm[R].IEICE Technical Report,ISEC2007-85,2007.
  • 5Skoric B.,Katzenbeisser S,Celik M.Symmetric tardos fingerprinting tbr arbitrary alphabet sizes[J].Designs, Codes and Cryptography, 2008,46(2): 137-166.
  • 6王彦,吕述望,徐汉良.一种二进制数字指纹编码算法[J].软件学报,2003,14(6):1172-1177. 被引量:15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部