期刊文献+

基于非对称水印的侵权取证方法研究 被引量:1

Research onTort Forensics Method Based on Asymmetric Watermarking
下载PDF
导出
摘要 在数字图像的侵权优化取证的研究中,数字图像的加密预处理的加密方法直接关系到后续侵权取证的成功率。对称水印机制需要暴露密钥而易受攻击,传统的对称水印的侵权取证方法因易受攻击,存在取证成功率不高的问题。为了解决上述问题,提出了基于非对称水印的侵权取证方法。对图像加密预处理加密时采用非对称水印嵌入对数字图像进行版权保护,因其在水印提取时密钥不需暴露出来,能够有效抗攻击保护侵权证据,避免了传统方法易受攻击影响的不足,通过完整地提取出侵权图像中的数字水印特征信息,并利用LSH聚类算法最终完成侵权证据的提取,保证了侵权取证的成功率。仿真结果表明,改进方法能够将侵权证据有效提取出来,具有较高的取证成功率,取得了满意的结果。 In the study of digital image tort forensics optimization,the encryption method of digital image encryption pretreatment is directly related to the success rate of follow-up tort forensics.Symmetric watermarking mechanism needs to expose the key and vulnerable,the traditional method of the symmetric watermarking tort forensics is vulnerable,and so the success rate of tort forensics is not high.In order to solve this problem,a method of the tort forensics based on asymmetric watermark was presented.It made use of asymmetric watermarking embedding for digital image copyright protection in image encryption pretreatment,because of keys without exposed in the extraction of watermark.It can effectively resist the attacks to protect evidence of infringement and to avoid the insufficient of the traditional method vulnerable effects,by integrally extracting the digital watermark characteristic information in tort images and making use the clustering algorithm of LSH.Finally,it completed the tort evidence extraction to ensure the success rate of infringement evidence.The simulation results show that the improved method can effectively extract the evidence of infringement with high success rate of forensics and satisfactory results.
作者 何一辉
出处 《计算机仿真》 CSCD 北大核心 2012年第10期173-176,共4页 Computer Simulation
关键词 侵权取证 对称水印 非对称水印 版权保护 Tort forensics Symmetric watermarking Asymmetric watermarking Copyright protection
  • 相关文献

参考文献5

  • 1M Barni, F Bartolini, T Furon, A General Framework for Robust Watermarking Security [ J ]. Signal Processing, 2003,83 ( 10 ) : 2069 - 2084.
  • 2A Silverberg, J Staddon, J L Walker. Applications of List Deco- ding to Tracing Traitors[ J]. IEEE Transactionson Information The- ory, 2003,49(5) :1312 - 1318.
  • 3裘风光,李富平.MPEG-4视频数字水印技术的设计与实现[J].电子技术应用,2004,30(1):4-6. 被引量:10
  • 4Ding Huang, Hong Yan. Interword Distance Changes Rep resented by Sine for Watermarking Text Images [ J ]. IEEE Trans. on Cir- cuits and Systems for Video Technology, 2001,11 ( 12 ) : 1237 - 1245.
  • 5李国明,李象霖.采用Torus映射与SVD变换的图像数字水印方法[J].计算机仿真,2011,28(6):125-128. 被引量:3

二级参考文献11

  • 1刘锋,孙林军.一种基于DCT和SVD的数字图像水印技术[J].计算机应用,2005,25(8):1944-1945. 被引量:14
  • 2张志宏,陈凤祥,王伟.一种基于奇异值分解的盲水印[J].计算机仿真,2005,22(8):115-117. 被引量:15
  • 3李蓓,金聪.基于混沌序列和奇异值分解的鲁棒数字水印算法[J].计算机应用,2005,25(B12):138-139. 被引量:5
  • 4张宪海,杨永田.基于DFT-SVD域抗几何攻击图像水印算法[J].计算机工程,2006,32(18):120-121. 被引量:9
  • 5Liu Ruizhen, Tan Tieniu. An SVD - Based Watermarking Scheme for Protecting Rightful Ownership[J]. IEEE Transactions on Multimedia,2002,4 ( 1 ) : 121 - 128.
  • 6Zhang Xiao Ping, Li Kan. Comments on "An SVD - Based Watermarking Scheme for Protecting Rightful Ownership" [ J ]. IEEE Transactions on Multimedia, 2005,7 (2) : 593 - 594.
  • 7Luc Lamarche, Liu Yan, Zhao Jiying. Flaw in SVD -based Watermarking[ C]. Canadian Conference on Electrical and Computer Engineering, 2006. 2082 - 2085.
  • 8I Pitas, G Voyatzis. Applications of toral automorphisms in image watermarking[C]. IEEE International Conference on Image Processing, 1996,1:237 -240.
  • 9G Voyatzis, I Pitas. Digital image watermarking using mixing systems[J]. Computer & Graphics, 1998,22(3) :405 -416.
  • 10李象霖.数字图像处理讲义[M].中国科学院研究生院,2005..

共引文献11

同被引文献9

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部