簡易檢索 / 詳目顯示

研究生: 曾立至
論文名稱: 一個抵抗非法散播的影片身份辨識資訊方法
A Video Fingerprinting Method Against Illegal Distribution
指導教授: 張隆紋
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 24
中文關鍵詞: 個人身份辨識資訊加密數位版權管理
外文關鍵詞: fingerprinting, encryption, DRM
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在這篇論文中,我們在散播數位內容之前,使用個人身份辨識資訊的技術來嵌入使用者的個人身份辨識,也就是俗稱的指紋。那麼數位內容就不再受到像傳統一般的存取控制。而要達到這一點,指紋必須是很難被從數位內容中移除的,以便達到在偵測時可以抓到非法散播的使用者。如果我們想要保護數位內容,我們需要有追蹤和偵測出非法使用者的能力。我們提出的是基於區塊的方法,所以它可以適用於現存的影片格式,像是MPEG 1/2。如果有很多的使用者要使用,由於我們的指紋是基於 BIBD 的設計,所以可以有足夠多的指紋可供使用,原因是在於這些指紋是有相關性而不是各自獨立。從實驗的結果看來我們提出的方法可以對抗蠻多常見的攻擊,在經過這些攻擊後,我們也可以經由偵測的結果去追蹤出來是哪個使用者非法散播數位內容。


    In this paper, we use fingerprinting which is a technology for embedding the user’s identity, known as the fingerprint, before the distribution of content. Then the content is no longer protected by the access control. It is necessary that fingerprints are difficult to remove from the content because the evil users want to escape from the detection of fingerprinting. If we want to protect the delivered digital content, we often require the ability to trace and identify entities involved in the illegal redistribution of the content. Our fingerprinting method is block-based so that it can be used in the existing video standards, like MPEG 1/2. If there are many users, the fingerprints designed by BIBD are enough to meet the problem because of their dependence. From the detection results, our method is robust to many attacks in experiments and we can trace the users who distribute their copy illegally.

    Contents ABSTRACT (in Chinese) i ABSTRACT (in English) ii ACKNOWLEDGEMENTS iii List of Contents iv List of Figures v Chapter 1 Introduction 1 Chapter 2 Related Works 3 Chapter 3 The Fingerprinting Method……………………………… 4 A. The fingerprint based on BIBD 5 B. Robust fingerprint embedding 7 C. The detection of the fingerprint in a video 11 D. The encryption of the video 13 Chapter 4 Experimental Results 16 Chapter 5 Conclusions 22 Reference 23

    [1] C. I. Podilchuk and W. Zeng, " Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, May 1998, pp. 525-539.
    [2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. Image Processing, Vol. 6, No. 12, pp. 1673-1687, Dec. 1997
    [3] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual Watermarks for Digital Images and Video," Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1108-1126.
    [4] D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data,” IEEE Trans. On Information Theory, Vol. 44, No. 5, September 1998.
    [5] Zheng Liu, Xue Li, Zhaoyang Dong: Direct Fingerprinting on Multicasting Compressed Video. MMM 2005: 76-83.
    [6] Josep Domingo-Ferrer, Jordi Herrera-Joancomartí: Simple Collusion-Secure
    Fingerprinting Schemes for Images. ITCC 2000: 128-132.
    [7] I.J Cox, J. Kilian, T. Leighton, and T. Shamoon, “A secure, robust watermark
    for multimedia,” , RJAnderson, Ed. Cambridge, UK: Springer-Verlag, 1996, vol.
    1174, Lecture Notes in Computer Science, pp. 183-206.
    [8] W. Trappe, M. Wu, Z. Wang, and K.J.R. Liu: "Anti-collusion Fingerprinting for Multimedia", IEEE Trans. on Signal Processing, Special issue on Signal Processing for Data Hiding in Digital Media & Secure Content Delivery, vol. 51, no. 4, pp.1069-1087, April 2003.
    [9] M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, pp.15-27, March 2004.
    [10] W. Trappe, M. Wu, and K.J.R. Liu: "Collusion-Resistant Fingerprinting for Multimedia," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02), vol.4, pp.3309-3312, Orlando, FL, May 2002.
    [11] Dittmann, J. “Combining digital watermarks and collusion secure fingerprints for customer copy monitoring”, Secure Images and Image Authentication (Ref. No. 2000/039), IEE Seminar on 10 April 2000 Page(s):6/1 - 6/6
    [12] Kundur D, Karthik K. “Video fingerprinting and encryption principles for
    digital rights management” [J]. IEEE Multimedia, 2004,92(6):918-932.
    [13] Dinitz, Jeffrey H.,/Stinson, D. R./edited by Jeffrey H. Dinitz, Dougla, “Contemporary design theory :a collection of surveys”. A Wiley-Interscience Publication.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE