详细信息
分类信息:
>>学科导航分类法 _工学 _计算机科学与技术 _计算机应用技术
封面图片 自有资源  
无权查看内容文件信息  
题名 数字水印在版权保护上的IBM攻击与防范的研究
姓名 王维林
院系 信息科学与工程学院
专业 计算机应用技术
学位名称 工学硕士
外文题名 IBM Attack and Its Resisting Approach for Copyright Protection in Watermarking
第一导师姓名 屈志毅
关键词 数字水印版权保护;IBM攻击;多所有权申明的防范技术;单向性水印算法;基于特征的水印技术;动态特征水印算法;水印部署策略
外文关键词 Copyright Protection;IBM Attack;Protection for Multiple Claims of Ownership;One-Way Watermarking Algorithm;Feature-based Watermarking;Dynamic Feature-based Watermarking;Watermarking Deploying Strategies
学科 工学
摘要 技术是多媒体数据版权保护的重要方法,近年来得到广泛的研究和关注。数字水印技术由于其不可察觉性、可证明性和健壮性的特点,是后验式身份验证和信息跟踪的有效方法。数字水印技术用于版权保护与水印模式和版权保护法律紧密相关。 版权保护中的多所有权申明问题,也叫IBM攻击,是数字水印版权保护的瓶颈。传统的基于特征的水印算法,由于水印特征提取算子是开放的(由水印模式决定),其携带水印数据的特征信息容易暴露给攻击者,水印算法容易遭受攻击。而且,大多数算法嵌入的水印信息是独立的,水印算法的单向性得不到保证,从而遭受IBM攻击的概率较大。本文提出了基于动态特征的水印算法,其水印特征提取算子与嵌入多媒体数据中的水印信息由其嵌入的水印内容(对公众是透明的)单向决定,能够很好的避免攻击者对水印数据的特征信息及其所携带的水印信息进行攻击,水印信息的保护更安全。并且其嵌入的水印信息与特征提取算子、多媒体原始数据的特征信息、多媒体原始数据相关,使攻击者伪造有意义的攻击水印序列更困难。 ,我们首次将水印版权保护划分为水印算法与水印部署策略(两者统称为水印模式)两部分,以方便对多水印引入的IBM攻击进行防范研究。同时,相应的水印部署策略,增强了版权保护系统的有效性和完备性。
外文摘要 Digital watermarks have been proposed in recent literature as the approach for copyright protection of multimedia data. For its invisibili- ty, validity and robustness, digital watermark is an effective Post Ar- chitecture approach for personality identification and information trace. The watermark used for copyright protection is related to the watermark scheme and copyright protection laws. Multiple claims of the rightful ownership for a digital product, also called the IBM attack, are the threshold for the watermarking usage in the copyright protection. In the normal feature-based algorithms, the feature extractors are decided by the watermarking scheme and open to the public, so the watermarked features are exposed to attackers and the wate- rmarking scheme is vulnerable. At the same time, the inserted watermarks are irrespective for each other and we can not ensure the One-Way charact- eristic of the algorithm, so the IBM attack is possible. In the paper, our feature extractors and inserted watermarks are decided by the water- marking content and transparent to the public, so attackers can not extract the watermarked features from the watermarked multimedia data and do the modification. And the inserted signature is interrelated with the feature extractors, extracted features and original un-watermarked multimedia, so attackers are impossible to fabricate effective watermarks. To resolve the IBM attack brought by the multiple watermarks in a digital product, we divide the copyright protection system into watermarking algorithm and watermarking deploying strategy two parts in the paper. When they cooperate well, the validity and completeness of the system can be resolved.
研究领域 图像处理与模式识别
保存本页    打印本页