期刊文献+

抗共谋数字指纹研究综述 被引量:4

An Overview on Anti-Collusion Digital Fingerprint
下载PDF
导出
摘要 随着互联网以及多媒体技术的发展,数字版权保护技术已经成为了人们广泛关注的话题,而多个用户联合进行的共谋攻击已经威胁到发行商和其他合法用户权益。本文主要对多媒体数据中的抗共谋攻击研究现状进行了综述,介绍了若干具有代表性的抗共谋攻击方案,并提出了一些可行的研究方向。 Digital rights protection has become an important issue as the development of the Internet and multimedia technologies. It is easy for a group of users to work together and collectively mount attacks against the fingerprints or the tracing information. Collusion attack provides a cost-effective method for attenuating each of the colluder's water- marks. In this article, we review some major design methodologies for anti-collusion fingerprint of multimedia, give a broad overview of the recent advances in this area, and discuss the future of anti-collusion methods.
出处 《计算机科学》 CSCD 北大核心 2006年第12期52-55,共4页 Computer Science
关键词 共谋攻击 数字水印 数字指纹 Collusion attack,Digital watermark,Digital fingerprint
  • 相关文献

参考文献28

  • 1Blakley G R, Meadows C, Purdy G B, Fingerprinting Long Forgiving Messages, LNCS, 1986,218:180-189 被引量:1
  • 2Boneh D, Shaw J. Collusion-Secure Fingerprinting for Digital Data. IEEE Trans, Information Theory, 1998, 44:1897-1905 被引量:1
  • 3Yacobi Y. Improved Boneh-Shaw Content Fingerprinting.LNCS, 2001, 2020:378-391 被引量:1
  • 4Dittmann J, Behr A, Stabenau M, et al. Combining Digital Watermarks and Collusion Secure Fingerprints for Digital Images.IS&T/SPIE Conf Security and Watermarking of Multimedia Contents, California, 1999 被引量:1
  • 5Trappe W, Wu M, Wang Z J, et aL Antl-collusion Fingerprinting for Multimedia. IEEE Trans. Signal Processing, 2003, 51:1069-1087 被引量:1
  • 6Domingo-Ferrer J, Herrera-Joaneomarti J. Short Collusion-Secure Fingerprints Based on Dual Binary Hamming Codes. Electron Lett,2000,86:1697-1699 被引量:1
  • 7Zane F. Efficient Watermark Detection and Collusion Security.LNCS,2000,1962:21-32 被引量:1
  • 8Sebe F, Domingo Ferrer J. Collusion-Secure and Cost-Effective Detection of Unlawful Multimedia Redistribution. IEEE Trans.Systems, Man, and Cybernetics Part C: Applications and Reviews, 2003,33: 382-389 被引量:1
  • 9Kilian J, Leighton T, Matheson L, et al. Resistance of Digital Watermarks to Collusive Attacks: [Tech Rep]. Prlneeton, Department of Computer Science, 1998 被引量:1
  • 10Stone H. Analysis of Attacks on Image Watermarks with Randomized Coefficients: [Tech Rep]. Princeton, NJ: NEC Res Inst,1996 被引量:1

二级参考文献52

  • 1Craver S Memon N Yeo B 等.不可见水印能否解决版权所有权问题 (RC20509)(英文版)[M].美国:IBM,1996.. 被引量:1
  • 2Hirschfeld J W P.投影几何有限域(英文版)[M].伦敦:牛津大学出版社,1998.. 被引量:1
  • 3Dittmann J Schmitt P Saar E.适用于数字图像的数字水印和抗共谋的指纹技术[J].电子成像杂志,2000,9(4):456-467. 被引量:1
  • 4Pfitzmann B Shunter M.不对称指纹[J].Springer-Verlag计算机科学讲座(英文版),1996,(1070):84-95. 被引量:1
  • 5纪震 张基宏 肖薇薇.一种基于霍夫变换的抗旋转、尺度变换、剪切的第二代数字水印算法[J].电子学报(英文版),2003,12(1):126-131. 被引量:1
  • 6B Pfitzmann,A-R Sadeghi. Anonymous fingerprinting with direct non-repudiation. In: T Okamoto. ASIACRYPT 2000. Lecture Notes in Computer Science 1976. Springer-Verlag, 2000. 401-414 被引量:1
  • 7T O kamoto,S Uchiyama. An efficient public-key cryptosystem. In: K Nyberg. Advances in Cryptology-Eurocrypt 98. Lecture Notes in Computer Science 1403. Springer-Verlag, 1998. 308-318 被引量:1
  • 8M Naor,B Pinkas. Threshold traitor tracing. In: Hugo Krawczyk. Advances in Cryptology-Crypto'98. Lecture Notes in Computer Science 1462. Springer-Verlag, 1998. 502-517 被引量:1
  • 9A Fiat,T Tassa. Dynamic traitor tracing. In: M Wiener. CRYPTO 1999. Lecture Notes in Computer Science 1666. SpringerVerlag, 1999. 354-371 被引量:1
  • 10D Boneh, M Franklin. An efficient public key traitor tracing scheme. In: M Wiener. Advances in Cryptology-Crypto99. Lecture Notes in Computer Science 1666. Springer-Verlag, 1999. 338-353 被引量:1

共引文献18

同被引文献17

  • 1Sweldens W.The Lifting scheme:A custom design construction of biorthogonal wavelets[J].Applied and Computational Harmonic Analysis(ACHA),1996,3:186-200. 被引量:1
  • 2Calderbank R,Dauberchies I,Sweldens W,et al.Wavelet transforms that map integers to integers[J].Applied and Computational Harmonic Anablysis(ACHA),1998,5(3):332-369. 被引量:1
  • 3Miller M L,Cox I J,Linnartz J P M G,et al.A review of watermarking principles and practices[J].Digital Signal Processing for Multimedia Systems,1999:461-485. 被引量:1
  • 4Wu M,Trappe W,Wang Z J,et al.Collusion-resistant fingerprinting for multimedia[J].Signal Processing Magazine,2004,21(2):15-27. 被引量:1
  • 5Trappe W,Wu M,Wang Z J,et al.Anti-collusion fingerprinting for multimedia[J].IEEE Transactions on Signal Processing,2003,51(4):1069-1087. 被引量:1
  • 6Wang Z J,Wu M,Zhao H V,et al.Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation[J].IEEE Transactions on Image Processing,2005,14(6):804-821. 被引量:1
  • 7Chen B,Wornell G W.Quantization index modulation methods for digital watermarking and information embedding of multimedia[J].Journal of VLSI Signal Processing Systems for Signal,Image and Video Technology,2001,27(1/2):7-33. 被引量:1
  • 8Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423-1443. 被引量:1
  • 9Varna A L,He S,Swaminathan A,et al.Fingerprinting compressed multimedia signals[J].IEEE Transactions on Information Forensics and Security,2009,4(3):330-345. 被引量:1
  • 10Watson A B.DCT quantization matrices visually optimized for individual images[C]//IS&T/SPIE’s Symposium on Electronic Imaging:Science and Technology.[S.l.]:International Society for Optics and Photonics,1993:202-216. 被引量:1

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部