吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (2): 658-662.doi: 10.13229/j.cnki.jdxbgxb201602048

• 论文 • 上一篇    下一篇

多媒体群组指纹系统中的群组叛逆者追踪

赵勇, 夏正敏   

  1. 上海交通大学 电子信息与电气工程学院,上海 200240
  • 收稿日期:2014-06-29 出版日期:2016-02-20 发布日期:2016-02-20
  • 通讯作者: 夏正敏(1980-),女,讲师.研究方向:信息安全,网络空间安全,大数据安全.E-mail:zhengminxia@sjtu.edu.cn E-mail:shphdyong@126.com
  • 作者简介:赵勇(1980-),男,博士研究生.研究方向:多媒体取证,数字指纹,信号处理,安全协议.E-mail:shphdyong@126.com
  • 基金资助:
    国家自然科学基金项目(61271316, 61071152); "973"国家重点基础研究发展计划项目(2013CB329603); 国家"十二五"科技支撑计划项目(2012BAH38B04)

Croup traitor tracking in the multimedia group fingerprinting system

ZHAO Yong, XIA Zheng-min   

  1. School of Electronic Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China
  • Received:2014-06-29 Online:2016-02-20 Published:2016-02-20

摘要: 建立了复合正交,复合编码,DCT和DWT群组指纹方案,采用最大相关等方法追踪叛逆群组.结合仿真实验对这些方案的群组识别性能进行了比较.结果显示,这些群组指纹方案有效地识别了叛逆群组;复合编码群组指纹方案在噪声和JPEG压缩后性能最佳;在多分组或单分组多成员合谋攻击下,DWT方案性能最优.

关键词: 信息处理技术, 群组指纹, 群组合谋, 群组追踪, 性能比较

Abstract: The composite orthogonal, composite coded, Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) group fingerprinting schemes are constructed. Based on these schemes, the group traitor tracking algorithms (e.g. maximum correlation detector) are implemented. Experiments are carried out to compare the performance of these constructed group fingerprinting schemes. Results show that in all cases the group fingerprinting schemes can perform group detection effectively. The composite coded group fingerprinting scheme performs the best in noisy environment and after JPEG compression. The DWT scheme performs the best under group colluding attacks from different groups and the signal group.

Key words: information processing techniques, group fingerprint, group collusion, group tracing, performance comparison

中图分类号: 

  • TP391
[1] Chor B, Fiat A, Naor M, et al. Tracing traitors[J]. IEEE Transactions on Information Theory, 2000, 46(3): 893-910.
[2] Kuribayashi M.A simple tracing algorithm for binary fingerprinting code under averaging attack[C]//The 1st ACM Workshop on Information Hiding and Multimedia Security,Montpellier,France,2013:3-12.
[3] Marcel S, Waldemar B, Martin S. Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes[C]//ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, 2011: 41-50.
[4] Zhao Yong, Zhang Ai-xin, Lu Song-nian. Group fingerprinting communication protocols for digital wholesale and retail in E-commerce[C]//The 2rd International Conference on Informatics and Applications, Lodz, Poland, 2013: 143-146.
[5] Mintzer F, Braudaway G W. If one watermark is good, are more better?[C]//Proceedings of the International Conference on Acoustics, Speech and Signal Processing, Phoenix, Arizona, USA, 1999: 2067-2070.
[6] Chu S C, Jain L C, Huang H C, et al. The triple-watermarking algorithm with multiple description coding over lossy communication networks[C]//The 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 2009: 317-326.
[7] Raval M S, Rege P P. Discrete wavelet transform based multiple watermarking schemes[C]//Conference on Convergent Technologies for the Asia-Pacific region, Taj Residency, Bangalore, 2003: 935-938.
[8] Wang Z, Wu M, Trappe W, et al. Group-oriented fingerprinting for multimedia forensics[J]. EURASIP Journal on Applied Signal Processing, 2004, 14: 2142-2162.
[9] Tirkel A Z, Hall T E, Osborne C F. Collusion resistant fingerprinting of digital audio[C]//The 4th International Conference on Security of Information and Networks, Sydney, Australia, 2011: 5-12.
[10] Wang Z J, Wu M, Zhao H V, et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation[J]. IEEE Transactions on Image Processing, 2005, 14(6): 804-821.
[11] He S, Wu M. Adaptive detection for group-based multimedia fingerprinting[J]. IEEE Signal Processing Letters, 2007, 14(12): 964-967.
[12] Jin H X, Lotspiech J, Nelson M, et al. Adaptive traitor tracing for large anonymous attack[C]//ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, 2008: 1-8.
[13] Zhao Yong, Zhang Ai-xin, Lu song-nian. DCT fingerprint classifier based group fingerprint[C]//International Conference on Audio, Language, and Image Processing, Shanghai, China, 2014:292-295.
[14] Zhao Yong, Zhang Ai-xin, Lu Song-nian. The DWT group fingerprinting scheme[C]//IEEE International Conference on Dependable, Autonomic and Secure Computing, Dalian, China, 2014:81-84.
[1] 苏寒松,代志涛,刘高华,张倩芳. 结合吸收Markov链和流行排序的显著性区域检测[J]. 吉林大学学报(工学版), 2018, 48(6): 1887-1894.
[2] 徐岩,孙美双. 基于卷积神经网络的水下图像增强方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1895-1903.
[3] 黄勇,杨德运,乔赛,慕振国. 高分辨合成孔径雷达图像的耦合传统恒虚警目标检测[J]. 吉林大学学报(工学版), 2018, 48(6): 1904-1909.
[4] 李居朋,张祖成,李墨羽,缪德芳. 基于Kalman滤波的电容屏触控轨迹平滑算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1910-1916.
[5] 应欢,刘松华,唐博文,韩丽芳,周亮. 基于自适应释放策略的低开销确定性重放方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1917-1924.
[6] 陆智俊,钟超,吴敬玉. 星载合成孔径雷达图像小特征的准确分割方法[J]. 吉林大学学报(工学版), 2018, 48(6): 1925-1930.
[7] 刘仲民,王阳,李战明,胡文瑾. 基于简单线性迭代聚类和快速最近邻区域合并的图像分割算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1931-1937.
[8] 单泽彪,刘小松,史红伟,王春阳,石要武. 动态压缩感知波达方向跟踪算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1938-1944.
[9] 姚海洋, 王海燕, 张之琛, 申晓红. 双Duffing振子逆向联合信号检测模型[J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290.
[10] 全薇, 郝晓明, 孙雅东, 柏葆华, 王禹亭. 基于实际眼结构的个性化投影式头盔物镜研制[J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297.
[11] 陈绵书, 苏越, 桑爱军, 李培鹏. 基于空间矢量模型的图像分类方法[J]. 吉林大学学报(工学版), 2018, 48(3): 943-951.
[12] 陈涛, 崔岳寒, 郭立民. 适用于单快拍的多重信号分类改进算法[J]. 吉林大学学报(工学版), 2018, 48(3): 952-956.
[13] 孟广伟, 李荣佳, 王欣, 周立明, 顾帅. 压电双材料界面裂纹的强度因子分析[J]. 吉林大学学报(工学版), 2018, 48(2): 500-506.
[14] 林金花, 王延杰, 孙宏海. 改进的自适应特征细分方法及其对Catmull-Clark曲面的实时绘制[J]. 吉林大学学报(工学版), 2018, 48(2): 625-632.
[15] 王柯, 刘富, 康冰, 霍彤彤, 周求湛. 基于沙蝎定位猎物的仿生震源定位方法[J]. 吉林大学学报(工学版), 2018, 48(2): 633-639.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!