信息隐藏技术-第六章-数字指纹.ppt
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《信息隐藏技术-第六章-数字指纹.ppt》由会员分享,可在线阅读,更多相关《信息隐藏技术-第六章-数字指纹.ppt(39页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、第六章第六章 数字指纹数字指纹第五章 内容回顾2023/2/152数字视频水印基础鲁棒视频水印算法脆弱视频水印算法视频水印几个特殊问题与方法第六章 主要内容2023/2/153数字指纹概述多用户合谋攻击典型数字指纹数字指纹安全协议What is digital fingerprinting2023/2/154Human fingerprintSimilar with human fingerprintA group of special watermarks embedded into digital media data different from each other/every one
2、 is unique;can be used to identify any one copy;can be used to trace pirate and traitors.Digital fingerprinting2023/2/155Design goals2023/2/156Catch many The goal in this design scenario is to capture as many colluders as possible,though possibly at a cost of accusing more innocent users.For this de
3、sired goal,the set of performance criteria consists of the expected fraction of colluders that are successfully captured and the expected fraction of innocent users that are falsely placed under suspicion.数字指纹的发展历史2023/2/157英国内阁秘密文件泄密事件 1981年,英国内阁秘密文件的图片被翻印在报纸上登出。传闻事先玛格丽特.撒切尔夫人给每位部长分发了可唯一鉴别的文件副本。每份副
4、本有着不同字间距,用于确定收件人的身份信息,用这种方法查出了泄密者。数字指纹的发展历史2023/2/158关于数字指纹技术的最早论文是在1983 年发表的题为Fingerprinting的文章,介绍了指纹的思想和一些术语,并提出了基于假设校验的统计指纹。1994年Benny Chor,Amos Fiat,Moni Naor发表文章“Tracing traitors”。文中提出了三种方案来对抗多个不诚实用户的合谋攻击,其思想成为后来许多抗合谋数字指纹方案的基础。数字指纹的发展历史2023/2/159C.Boneh和H.Shaw于1995年提出了一个清晰的抗合谋攻击的编码方案,称为C-安全编码(C
5、-secure code)的数字指纹经典方案。该方案对嵌入条件作了假设,其编码方法与使用的数据嵌入算法无关。随后出现了用于叛逆者跟踪和数字取证的数字指纹技术,并得到了广泛的研究。非对称指纹,匿名指纹;汉明码,BIBD,高斯分布指纹,Micosoft Research:a dual watermark-fingerprint.数字指纹的主要问题2023/2/1510Works well without any attackA common watermark attacks/single-copy attacksMulti-copy attacks/Collusion attacks Collu
6、ders use their copies to produce a new copy employing various ways.They decrease the risk of being captured from the new copy possibly.合谋攻击/共谋攻击。第六章 主要内容2023/2/1511数字指纹概述多用户合谋攻击典型数字指纹数字指纹安全协议多用户合谋攻击2023/2/1512Linear collusion and non-linear collusionUsersDistributed copies DigitalfingerprintsNew ima
7、ge copy线性合谋2023/2/1513Linear collusion非线性合谋2023/2/15141)随机选择拷贝方式:2)随机选择值方式:3)最小值方式:4)最大值方式:5)中值方式:6)最小值-最大值方式:7)最小值-最大值-中值:8)随机最小值-最大值:非线性合谋攻击2023/2/1515 1 H.Vicky Zhao,Min Wu,Z.Jane Wang,et al.Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting,IEEE Transactions on image
8、processing,2005.5,Vol.14,No.5,646-661.两个重要指标2023/2/1516The probability of a false negative PfnThe probability of a false positive Pfp Pfp10-6,Pfn10-3.Different concerns arise under different situations,however the fingerprinting system must be designed according to appropriate performance criteria.D
9、esign goals2023/2/1517Catch one For this desired goal,the set of performance criteria consists of the probability of a false positive and the probability of a false negative.From the detectors point of view,a detection approach fails when either the detector fails to identify any of the colluders(a
10、false negative)or the detector falsely indicates that an innocent user is a relevant when providing evidence in a court of law.Design goals2023/2/1518Catch all In this design scenario,the fingerprints are designed to maximize the probability of capturing of innocents being falsely accused.This arise
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 信息 隐藏 技术 第六 数字 指纹
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内