The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
针对多模态多目标优化中种群多样性难以维持和所得等价Pareto最优解数量不足问题,提出一种融合聚类和小生境搜索的多模态多目标优化算法(multimodal multi-objective optimization algorithm with clustering and niching searching,CSS...针对多模态多目标优化中种群多样性难以维持和所得等价Pareto最优解数量不足问题,提出一种融合聚类和小生境搜索的多模态多目标优化算法(multimodal multi-objective optimization algorithm with clustering and niching searching,CSSMPIO)。首先利用基于聚类的特殊拥挤距离非支配排序方法(clustering-based special crowding distance,CSCD)初始化种群;引入自适应物种形成策略生成稳定的小生境,在不同的小生境子空间并行搜索和保持等价Pareto最优解;采用特殊拥挤距离非支配排序策略实现个体选优、精英学习策略避免过早收敛。通过在14个多模态多目标函数上进行测试,并与7种新提出的多模态多目标优化算法进行对比实验以及Wilcoxon秩和检验发现,CSSMPIO的总体性能优于对比算法。最后将算法用于基于地图的测试问题,进一步证明了算法的有效性。展开更多
为了解决增量流形学习中的噪声干扰,以及对不同分布状态下的新数据进行流形降维问题,本文提出一种数据流形边界及其分布条件的增量式降维算法(incremental dimensionality reduction algorithm based on data manifold boundaries and d...为了解决增量流形学习中的噪声干扰,以及对不同分布状态下的新数据进行流形降维问题,本文提出一种数据流形边界及其分布条件的增量式降维算法(incremental dimensionality reduction algorithm based on data manifold boundaries and distribution state,IDR-DMBDS)。该算法首先分析噪声概率分布同时对数据降噪,确定降噪数据的流形形态为主流形,并在主流形上表征出噪声的分布形式,以此获得近似的原数据流形边界,然后基于流形边界判别新数据的分布状态,最后将分布于原流形形态之上以及之外的新数据分别映射至低维空间。实验表明,该算法能够有效实现基于流形的增量式高维含噪数据的低维特征挖掘。展开更多
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ...The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ...Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.展开更多
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int...To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability.展开更多
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in...In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.展开更多
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.
文摘针对多模态多目标优化中种群多样性难以维持和所得等价Pareto最优解数量不足问题,提出一种融合聚类和小生境搜索的多模态多目标优化算法(multimodal multi-objective optimization algorithm with clustering and niching searching,CSSMPIO)。首先利用基于聚类的特殊拥挤距离非支配排序方法(clustering-based special crowding distance,CSCD)初始化种群;引入自适应物种形成策略生成稳定的小生境,在不同的小生境子空间并行搜索和保持等价Pareto最优解;采用特殊拥挤距离非支配排序策略实现个体选优、精英学习策略避免过早收敛。通过在14个多模态多目标函数上进行测试,并与7种新提出的多模态多目标优化算法进行对比实验以及Wilcoxon秩和检验发现,CSSMPIO的总体性能优于对比算法。最后将算法用于基于地图的测试问题,进一步证明了算法的有效性。
文摘为了解决增量流形学习中的噪声干扰,以及对不同分布状态下的新数据进行流形降维问题,本文提出一种数据流形边界及其分布条件的增量式降维算法(incremental dimensionality reduction algorithm based on data manifold boundaries and distribution state,IDR-DMBDS)。该算法首先分析噪声概率分布同时对数据降噪,确定降噪数据的流形形态为主流形,并在主流形上表征出噪声的分布形式,以此获得近似的原数据流形边界,然后基于流形边界判别新数据的分布状态,最后将分布于原流形形态之上以及之外的新数据分别映射至低维空间。实验表明,该算法能够有效实现基于流形的增量式高维含噪数据的低维特征挖掘。
文摘The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金This work is supported by the National Natural Science Foundation of China under Grant No. 61170269, No. 61170272, No. 61202082, Beijing Natural Science Foundation under Grant No. 4122026, the Fundamental Research Funds for the Central Universities under Grant No. BUPT2013RC0308, No. BUPT2013RC0311, and Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201210015007, KM201210015006.
文摘Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.
文摘To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability.
基金ACKNOWLEDGEMENTS This work has been supported by the National Natural Science Foundation of China under Grant No. 61272519, 61121061.
文摘In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.