(3.232.129.123) 您好!臺灣時間:2021/03/06 01:42
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:孫家豪
研究生(外文):Jia-Hao Sun
論文名稱:有限長度金鑰之安全的客戶端浮水印
論文名稱(外文):Secure Client Side Watermarking with Limited Key Size
指導教授:吳家麟
指導教授(外文):Ja-Lin Wu
口試委員:鄭文皇胡敏君
口試日期:2014-07-26
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:34
中文關鍵詞:密碼學數位智慧財產權管理浮水印安全的客戶端浮水印數位內容散播
外文關鍵詞:CryptographyDigital Right ManagementWatermarkingSecure Client Side WatermarkingDigital Content Delivering
相關次數:
  • 被引用被引用:0
  • 點閱點閱:100
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
數位浮水印技術使得數位內容擁有者得以在傳送數位內容前嵌入智慧財產相關訊息於數位內容中以保護其智慧財產權。隨著數位商務快速發展,數位內容散播成為了產品派送的主流,並使得嵌入浮水印成為保護智慧財產權的必要措施。在如此龐大的系統中,安全性、計算效率、以及通訊成本成為了服務提供者巨大的挑戰。換言之,發展一套穩固、有效率的安全數位內容派送系統有其急迫的必要。本篇論文中提出了一套創新的客戶端浮水印系統。我們描述了傳統浮水印不適合用在上述的大型系統的原因,並且在新系統中提出了相對應的解決方案。由於新提出的系統可以支援可見、不可見兩種浮水印,故新系統非常適用於雲端架構的數位內容散播系統如:Google及Amazon的線上書店、Apple的iTunes、以及Netflix的串流多媒體服務。

Digital watermarking techniques enable digital-content owners to protect their property rights by embedding right-related messages into the host content before delivery. With the rapid growth of E-commerce, digital-content broadcasting has become the main stream of product delivering, which makes watermark embedding a must for protecting the owner''s property rights. In such a large service system, security, computational efficiency, and communicational overhead are the most challenging issues to service providers. In other words, there is an urgent need for developing robust and efficient watermark schemes for securing a digital content delivering system. In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.

口試委員會審定書i
誌謝ii
摘要iii
Abstract iv
1 Introduction 1
2 Related Work 5
3 Preliminaries 7
3.1 Lagrange Polynomial Interpolation 7
3.2 Runge’s Phenomenon and the Modified Version of Lagrange Polynomial Interpolation 8
4 The Proposed Watermarking Schemes 11
4.1 Block-diagram of The Proposed Watermarking Scheme 11
4.2 Secure Client Side Visible Watermarking 13
4.2.1 Formulation 13
4.2.2 Analyses of the proposed Secure Client Side Visible Watermark Scheme 14
4.3 Secure Client Side Invisible Watermarking 15
4.3.1 Construction 15
4.3.2 Formulation 17
4.3.3 Analyses of the Proposed Secure Client Side Invisible Watermark Scheme 18
5 Experimental Results 20
5.1 Visible Watermark Scheme 20
5.2 Invisible Watermark Scheme 24
5.2.1 Experiments on system parameters 24
5.2.2 Experiment using optimal settings 28
6 Conclusion 30
Bibliography 31

[1] A. Adelsbach, U. Huber, and A.-R. Sadeghi. Fingercasting—joint fingerprinting and decryption of broadcast messages. In Information Security and Privacy, pages 136–147. Springer, 2006.
[2] R. Anderson and C. Manifavas. Chameleon —a new kind of stream cipher. In E. Biham, editor, Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 107–113. Springer Berlin Heidelberg, 1997.
[3] M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A dct-domain system for robust image watermarking. Signal processing, 66(3):357–372, 1998.
[4] T. Bianchi and A. Piva. Secure watermarking for multimedia content protection: A review of its benefits and open issues. Signal Processing Magazine, IEEE, 30(2):87–96, March 2013.
[5] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. Secure embedding of spread spectrum watermarks using look-up-tables. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on, volume 2, pages II–153–II–156, April 2007.
[6] M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen. Lookup-tablebased secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security, 3(3):475–487, 2008.
[7] T.-H. Chen, S.-H. Liu, H.-X. Yao, and W. Gao. Robust video watermarking based on dc coefficients of selected blocks. In Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, volume 9, pages 5273–5278. IEEE, 2005.
[8] T. Farah, H. Hermassi, R. Rhoouma, and S. Belghith. Watermarking and encryption scheme to secure multimedia information. In Computer and Information Technology (WCCIT), 2013 World Congress on, pages 1–5. IEEE, 2013.
[9] D. Goudia, M. Chaumont, W. Puech, and N. H. Said. A joint jpeg2000 compression and watermarking system using a tcq-based quantization scheme. In IS&;T/SPIE Electronic Imaging, pages 78820C–78820C. International Society for Optics and Photonics, 2011.
[10] C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in images. Image Processing, IEEE Transactions on, 8(1):58–68, Jan 1999.
[11] C.-H. Huang and J.-L. Wu. Attacking visible watermarking schemes. Multimedia, IEEE Transactions on, 6(1):16–30, Feb 2004.
[12] S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas. A buyer seller watermarking protocol based on secure embedding. Information Forensics and Security, IEEE Transactions on, 3(4):783–786, Dec 2008.
[13] M. Khan, V. Jeoti, A. Malik, and M. Khan. A joint watermarking and encryption scheme for dct based codecs. In Communications (APCC), 2011 17th Asia-Pacific Conference on, pages 816–820, Oct 2011.
[14] G. C. Langelaar, R. L. Lagendijk, and J. Biemond. Real-time labeling of mpeg-2 compressed video. Journal of Visual Communication and Image Representation, 9(4):256 – 270, 1998.
[15] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 13(12):1618–1626, Dec 2004.
[16] A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen. Secure watermark embedding through partial encryption. In Y. Shi and B. Jeon, editors, Digital Watermarking, volume 4283 of Lecture Notes in Computer Science, pages 433–445. Springer Berlin Heidelberg, 2006.
[17] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong. Reversible image watermarking using interpolation technique. Information Forensics and Security, IEEE Transactions on, 5(1):187–193, March 2010.
[18] H. S. Malvar and D. A. Florencio. Improved spread spectrum: a new modulation technique for robust watermarking. Signal Processing, IEEE Transactions on, 51(4):898–905, 2003.
[19] N. Memon and P. Wong. A buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 10(4):643–649, Apr 2001.
[20] A. Piva, T. Bianchi, and A. De Rosa. Secure client-side st-dm watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13–26, March 2010.
[21] C.-M. Pun, J.-J. Jiang, and C. L. P. Chen. Adaptive client-side lut-based digital watermarking. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 795–799, Nov 2011.
[22] J. W. Seok and J.-W. Hong. Audio watermarking for copyright protection of digital audio data. Electronics Letters, 37(1):60–61, Jan 2001.
[23] F. Siebenhaar, C. Neubauer, and J. Herre. Combined compression/watermarking for audio signals. PREPRINTS-AUDIO ENGINEERING SOCIETY, 2001.
[24] J. Zhang, W. Kou, and K. Fan. Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security, 153(1):15–18, 2006.
[25] X. Zhang. Reversible data hiding in encrypted image. Signal Processing Letters, IEEE, 18(4):255–258, April 2011.
[26] X. Zhang. Reversible data hiding with optimal value transfer. Multimedia, IEEE Transactions on, 15(2):316–325, Feb 2013.
[27] B. Zhao, L. Dang, W. Kou, J. Zhang, Z. Li, and K. Fan. A watermarking scheme in the encrypted domain for watermarking protocol. In D. Pei, M. Yung, D. Lin, and C. Wu, editors, Information Security and Cryptology, volume 4990 of Lecture Notes in Computer Science, pages 442–456. Springer Berlin Heidelberg, 2008.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔