期刊文献+

数字水印的去同步攻击及其对策 被引量:15

Desynchronization Attacks on Digital Watermarks and Their Countermeasures
下载PDF
导出
摘要 有望解决数字媒体版权纠纷的数字水印技术日渐成熟,新算法不断涌现,面临的攻击也与日俱增。去同步攻击通过几何变形使得相关检测器失效,是一个很难应付的攻击。该攻击主要包括全局仿射变换攻击和局域任意扭曲攻击两种。有很多算法能很好对付前者,但后者几乎使现存的所有算法失效。本文对各种对付去同步攻击的对策分类加以综述,并分析了各自的不足,最后指出如何有效地抵御局域任意扭曲攻击依然是一个悬而未决的课题,尚值得深入研究。 As a promising means to ascertain the copyright infringement of digital media, digital watermarking technique is getting more and more mature and new algorithms have been emerging. In the meantime, more and more attacks are confronting with it. This paper discusses desynchronization attack in detail, which disables the correlator through geometrical distortions and is very difficult to tackle. It mainly comprises global affine transformation attack and local random bending attack. Many algorithms can well withstand the former, but the latter almost defeats all existing algorithms. We categorize and summarize the countermeasures in detail, and analyze their deficiencies respectively. Finally we point out that how to effectively cope with desynchronization attack is still an open question and deserves a thorough research.
出处 《中国图象图形学报(A辑)》 CSCD 北大核心 2005年第4期403-409,共7页 Journal of Image and Graphics
基金 国家自然科学基金项目(60472083)
关键词 攻击 同步 数字水印技术 数字媒体 几何变形 仿射变换 新算法 检测器 失效 扭曲 局域 digital watermarking, desynchronization attack, affine transformation attack, local random bending attack, RST invariant
  • 相关文献

参考文献31

  • 1Hartung F, Kutter M. Multimedia watermarking techniques [ J ].Proceedings of the IEEE, 1999,87(7) :1079 - 1107.
  • 2Podilchuk C L, Zeng W. Image-adaptive watermarking using visual models [ J ]. IEEE Journal on Selected Areas of Communications,1998,16(4) :525 - 539.
  • 3Kutter M, Winkler S. A vision-based masking model for spread-spectrum image watermarking [ J ]. IEEE Transactions on Image Processing, 2002,11 ( 1 ) : 16 - 25.
  • 4Dong P, Galatsanos N P. Affine transformation resistant watermarking based on images normalization [ A ]. In : Proceedings of International Conference on Image Processing 2002 [ C ] , Rochester, USA : 2002 :489 - 492.
  • 5Petitcolas F A P. StirMark [ EB/OL ]. http ://www. cl. cam. ac. uk/- fapp2/watermarking/stirmark/, 1999-03 -01.
  • 6Voloshynovskiy S, Deguillaume F, Pun T. Muhibit watermarking robust against local nonlinear geometrical distortions [ A ]. In:Proceedings of International Conference on Image Processing 2001[ C ] , Thessaloniki, Greece, 2001:999 - 1002.
  • 7Moulin P, Ivanovi- A. The fisher information game for optimal design of synchronization patterns in blind watermarking [ A ]. In:Proceedings of International Conference on Image Processing 2001[ C ]. Thessaloniki, Greece, 2001:550 -553.
  • 8Dong P, Brankov J. Geometric robust watermarking through mesh based correction[ A ]. In: Proceedings of International Conference on Image Processing 2002 [ C ] , Rochester, USA, 2002:493 - 496.
  • 9Joseph J K. Ruanaidh ó, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking [ J ]. Signal Processing, 1998,66 (3) :303 - 317.
  • 10Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain [ J ]. IEEE Transactions on Image Processing,2001,10(11):1741 -1753.

同被引文献137

引证文献15

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部