期刊文献+

抗线性组合攻击的数字指纹方案 被引量:2

Digital fingerprint scheme for linear combination attack
下载PDF
导出
摘要 为了提高抗联合攻击码抵抗线性组合攻击的能力,提出一种改进的基于ACC码的指纹编码方案。该改进方案的指纹由ACC码串联构造而成,嵌入算法采用基于离散余弦变换的扩频嵌入技术,并在算法中应用人类视觉模型,利用改进的硬检测算法实现合谋者追踪。理论分析和实验结果表明,改进的指纹方案提高了追踪到至少一个线性组合攻击合谋者的概率。 To improve the ability of resisting the linear combination attack, an improved fingerprint scheme based on ACC code is proposed. The fingerprint of this improved scheme is composed of consecutive ACC code. This scheme uses DCT-based spread spectrum embedding, applies the human visual model, and uses improved hard detection to track the colluders. The theoretical analysis and experimental results demonstrate that the improved scheme increases the probability of tracing at least one colluder who uses linear combination attack.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第2期505-508,共4页 Computer Engineering and Design
关键词 数字指纹 嵌入假设 线性组合攻击 平均攻击 硬检测 digital fingerprint marking assumption averaging attack linear combination attack hard detection
  • 相关文献

参考文献11

  • 1Wu M,Trappe W, Wang Z J,et al.Collusion resistant fingerprin- ting for multimedia[J].IEEE Signal Processing Magazine,2004, 21(2):15-27.
  • 2Trappe W, Wu M,Jane Wang Z,et al.Anti-collusion fingerprinting for Multimedia[J].IEEE Trans on Signal Processing,2003,51(4): 1069-1087.
  • 3Wu Yongdong.Linear combination collusion attacks and its application on an anti-collusion fingerprinting[J].IEEE Conf on Acoustics, Speech, and Signal Processing, 2005,51 : 1069- 1087.
  • 4Hans Georg Schaathun.Novel attacks on spread-spectrum fm- gerprinting[J].EURASIP Journal on Information Security,2008.
  • 5Zhao H,Wu M,June Wung Z,et al.Nonlinear collusion attacks on independent fingerprints for multimedia[C].IEEE Computer So- ciety,2003:613-616.
  • 6Boneh D,Shaw J.Collusion-secure fingerprinting for digital data [J].IEEE Trans Inform Theory, 1998,44:1897-1905.
  • 7李栋,卢增祥,路海明.数字指纹编码与嵌入假设[J].计算机科学,2007,34(11):224-228. 被引量:9
  • 8Wang Z J.Anti-collusion forenscs of multimedia fmgerprinting using orthogonal modulation [J]. IEEE Trans on Image Proc, 2005,14(6):804-821.
  • 9Jae-Min Seol,Seong-Whan Kim.A scalable AND-ACC finger- printing scheme for practical contents distribution [C]. VCIP, SPIE,2003:1312-1318.
  • 10Wu Yongdong, Zhao Zhigang. Collusion attack to a scalable AND-ACC fingerprinting scheme[C].Proceedings of the SPIE, 2007.

二级参考文献20

  • 1Lin E T,Eskicioglu A M,Lagendijk R L,et al.Advances in Digital Video Content Protection.Proceedings of the IEEE,2005,93(1):171-183
  • 2Wu Min,Trappe W,Wang Z J,et al.Collusion-Resistant Fingerprinting for Multimedia.IEEE Signal Processing Magazine,March 2004.15-27
  • 3Boneh D,Shaw J.Collusion-Secure Fingerprinting for Digital Data.IEEE Trans Inform Theory,Sept.1998,44:1897-1905
  • 4Wang Z J,Wu M,Zhao H,et al.Resistance of Orthogonal Gaussian Fingerprints to Collusion Attacks.In:Proc.IEEE Int Conf.Acoustics,Speech,Signal Processing,Hong Kong,Apr.2003,724-727
  • 5Cox I J,Kilian J,Leighton F T.Secure Spread Spectrum Watermarking for Multimedia.IEEE Trans Image Processing,1997,6(12):1673-1687
  • 6Kirovski D,Mihcak M K.Bounded Gaussian Fingerprints and The Gradient Collusion Attack.ICASSP,2005.1037-1040
  • 7Wang Z J,et al.Anti-Collusion Forenscs of Multimedia Fingerprinting Using Orthogonal Modulation.IEEE Trans on Image Proc,2005,14(6):804- 821
  • 8Kim Won-gym,Suh Youngho.Short N-Secure Fingerprinting Code for Image.In:2004 International Conference on Image Processing (ICIP),2004.2167-2170
  • 9Domingo-Ferrer J,Herrera-Joancomarti J.Short collusion-secure fingerprints basedon dual binary Hamming codes.Electronics Letters,2000,36(20):1697-1699
  • 10Zeng W,Liu B.A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images.IEEE Trans Image Processing,1999,8:1534-1548

共引文献8

同被引文献15

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部