Traitor Tracing for Image Fingerprinting
博士 === 國立臺灣大學 === 資訊工程學研究所 === 95 === The demand of digital data protection is getting stronger dramatically nowadays as more and more digital contents are used on computers and distributed via the Internet. Digital fingerprinting is a technology designed to help protect digital assets and identify...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73052383610834723396 |
id |
ndltd-TW-095NTU05392043 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NTU053920432015-12-07T04:04:00Z http://ndltd.ncl.edu.tw/handle/73052383610834723396 Traitor Tracing for Image Fingerprinting 應用於影像指紋嵌入系統之叛徒追溯技術 Yu-Tzu Lin 林育慈 博士 國立臺灣大學 資訊工程學研究所 95 The demand of digital data protection is getting stronger dramatically nowadays as more and more digital contents are used on computers and distributed via the Internet. Digital fingerprinting is a technology designed to help protect digital assets and identify security leak sources. This dissertation addresses the problem of traitor tracing for image fingerprinting, including two major issues: watermarking strategies for image fingerprinting and the design of collusion-secure fingerprinting codes. In the fingerprint-watermarking, we propose a content-adaptive watermarking strategy, which can adaptively decide watermarking strengths and select suitable embedding positions according to the content based on a neural network and an optimization procedure respectively. It maintains the equilibrium of the robustness and the imperceptibility when embedding long fingerprints without the effort to deal with human visual models. Besides, the collusion-resistance is considered to resist collusion attacks. Experimental results show the feasibility of the proposed watermarking algorithm. In the fingerprint-designing, we derive a code construction scheme which constructs fingerprint in a concatenated way based on a user grouping policy. The concatenated construction method is analyzed and proven to be efficient in collusion-secure traceability codes: the larger alphabet size of the outer code guarantees the higher tracing ability and the binary inner code makes the fingerprint satisfying the “Strict Marking Assumption”. The group-based fingerprinting scheme can further improve the tracing ability under the concatenated code construction. Based on these two ideas of the fingerprint designing, we propose three collusion-secure traceability codes: the group-oriented traceability code, the hierarchical traceability code, and the member-exclusive traceability code. All of them successfully disperse the decoding efforts over the outer code and the inner code by the grouping structure. Both theoretical analyses and the practical implementation show good performances of error rates and collusion-resiliency. To sum up, the watermarking and code construction schemes developed in this dissertation provide more flexibility and higher collusion-resiliency than existing solutions, and thus offer a better match for the challenges of the traitor tracing for image fingerprinting. 吳家麟 2007 學位論文 ; thesis 111 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立臺灣大學 === 資訊工程學研究所 === 95 === The demand of digital data protection is getting stronger dramatically nowadays as more and more digital contents are used on computers and distributed via the Internet. Digital fingerprinting is a technology designed to help protect digital assets and identify security leak sources.
This dissertation addresses the problem of traitor tracing for image fingerprinting, including two major issues: watermarking strategies for image fingerprinting and the design of collusion-secure fingerprinting codes.
In the fingerprint-watermarking, we propose a content-adaptive watermarking strategy, which can adaptively decide watermarking strengths and select suitable embedding positions according to the content based on a neural network and an optimization procedure respectively. It maintains the equilibrium of the robustness and the imperceptibility when embedding long fingerprints without the effort to deal with human visual models. Besides, the collusion-resistance is considered to resist collusion attacks. Experimental results show the feasibility of the proposed watermarking algorithm.
In the fingerprint-designing, we derive a code construction scheme which constructs fingerprint in a concatenated way based on a user grouping policy. The concatenated construction method is analyzed and proven to be efficient in collusion-secure traceability codes: the larger alphabet size of the outer code guarantees the higher tracing ability and the binary inner code makes the fingerprint satisfying the “Strict Marking Assumption”. The group-based fingerprinting scheme can further improve the tracing ability under the concatenated code construction. Based on these two ideas of the fingerprint designing, we propose three collusion-secure traceability codes: the group-oriented traceability code, the hierarchical traceability code, and the member-exclusive traceability code. All of them successfully disperse the decoding efforts over the outer code and the inner code by the grouping structure. Both theoretical analyses and the practical implementation show good performances of error rates and collusion-resiliency.
To sum up, the watermarking and code construction schemes developed in this dissertation provide more flexibility and higher collusion-resiliency than existing solutions, and thus offer a better match for the challenges of the traitor tracing for image fingerprinting.
|
author2 |
吳家麟 |
author_facet |
吳家麟 Yu-Tzu Lin 林育慈 |
author |
Yu-Tzu Lin 林育慈 |
spellingShingle |
Yu-Tzu Lin 林育慈 Traitor Tracing for Image Fingerprinting |
author_sort |
Yu-Tzu Lin |
title |
Traitor Tracing for Image Fingerprinting |
title_short |
Traitor Tracing for Image Fingerprinting |
title_full |
Traitor Tracing for Image Fingerprinting |
title_fullStr |
Traitor Tracing for Image Fingerprinting |
title_full_unstemmed |
Traitor Tracing for Image Fingerprinting |
title_sort |
traitor tracing for image fingerprinting |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/73052383610834723396 |
work_keys_str_mv |
AT yutzulin traitortracingforimagefingerprinting AT línyùcí traitortracingforimagefingerprinting AT yutzulin yīngyòngyúyǐngxiàngzhǐwénqiànrùxìtǒngzhīpàntúzhuīsùjìshù AT línyùcí yīngyòngyúyǐngxiàngzhǐwénqiànrùxìtǒngzhīpàntúzhuīsùjìshù |
_version_ |
1718145875436371968 |