Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/8903
標題: 基於SHA256並以16碼編碼方式抵抗合謀攻擊及影像破壞的數位指紋方法
Digital Fingerprinting Scheme Based on SHA-256 & Extended-16Bits Encoding to Achieve Collusion Secure and Image Attack Resistant
作者: 林其模
Lin, Chi-Mo
關鍵字: Digital Fingerprinting;數位浮水印;Digital Watermarking;DWT;DCT;Turbo Code;SHA-256;Discrete Wavelet Transform;Discrete Cosine Transform;JPEG2000;數位指紋;雜湊函數;合謀安全;離散小波;離散餘弦;錯誤更正碼
出版社: 電機工程學系所
引用: [1].林禎吉,賴溪松合著,「資訊安全通訊第四卷第三期-數位浮水印的技術」,中華民國資訊安全學會 出版,pp.5-11, 87.06。 [2].葉義雄著,「資通安全專輯之十七-密碼與標準(The Standard of Cryptographic Primitive)」,國家實驗研究院科技 出版,, pp72-83, Jun, 2005. [3].連國珍著,「數位影像處理」,儒林出版,pp. 7-29-7-31 ,2nd 1999。 [4].陳後守,邱茂清,王忠炫,吳昭明合著,「錯誤更正碼(Error-Correcting Codes)」,無線網路教學推廣中心(大放異彩書局)出版,pp.177-193, Jun 2007。 [5].張智星著,「MATLAB 程式設計與應用」,清蔚科技 出版,pp. 8-2-10-19 ,2000年9月。 [6].三谷政昭,佐藤伸一合著,「世界第一簡單 密碼學」,世茂 出版,pp.192-195,2009年5月。 [7].蒙以正著,「Matlab入門與精進」,儒林 出版,pp. 5-2-5-13 ,2007年5月。 [8].鐘國亮著,「影像處理與電腦視覺」,東華書局 出版,pp. 13-21 ,2nd 1999。 [9].陳同孝,張真誠,黃國峰,「數位影像處理技術」,松岡 出版,pp.8-1-8-16,2001年1月。 [10].沈伯承,碩士論文,「基於灰階視覺密碼之浮水印技術」,2003年6月。 [11].郭炳南,碩士論文,「使用離散小波-餘弦複合式轉換及錯誤更正技術的多數決浮水印架構(Watermarking Scheme based on Majority Voting,DWT-DCT Composite and Error Correction Techniques)」,2009年7月。 [12].呂秉霖,碩士論文,「可容忍錯誤與共謀攻擊的指紋碼之追溯演算法的改進(Enhanced Tracing Algorithms for Random-Error-Resilient Collusion-Secure Fingerprinting Codes)」, 2005年6月. [13].施友植,碩士論文,「應用於JPEG2000之高效能低成本(5/3,9/7)小波轉換電路架構設計與實現(A Meomry-Efficient and High-Performance Architecture for the 5/3 and 9/7 Discrete Wavelet Transform in JPEG2000 Applications.)」, pp.3-18, July 2006. [14].張凱翔,碩士論文,「可漸進式偵測之數位浮水印(Digital Watermarking with Progressive Detection)」, 2000年8月. [15].孫曉東, 李萍, 閻鴻森,「Turbo 碼在電力線通信中的應用研究」,(西安交通大學電子與資訊工程學院,陝西西安710049),電力系統通信,2004年第4期。 [16].B. A. Forouzan , "Introduction to Cryptography and Network Security", McGraw Hill Higher Education, 1st ed., pp. 363-375, April 2007. [17].J. G. Proakis, "Digital Communications", 4th ed., McGraw-Hill, 2001. [18].S. Haykin, "Communication Systems", 4th ed., John Wiley& Sons, Inc., pp. 10-58-10-69 , 2001. [19].S. Theodoridis and K. Koutroumbas, "Pattern Recognition", 2nd Ed., Academic Pr, pp.233-235, 2003. [20].Y. Zhu, W. Zou, and X. Zhu, "Collusion secure convolutional fingerprinting information codes", In ASIACCS ’06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 266–274, New York, NY, USA, 2006. ACM Press. [21].Y. Itakura, S. Tsujii, "Proposal on Bio-PKI in which DNA Personal Identifier is embedded in Public Key", IWAP(The Third International Workshop for Applied PKI), pp.108-114, 2004. [22].D. Boneh and J . Shaw, "Collusion-Secure Fingerprinting for Digital Data", In CRYPTO ’95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pages 452–465, London, UK, 1995. [23].A.Barg, C.R. Blakly, and C. Kabatiansky. "Digital Fingerprinting Codes: Problem Statements, Constructions, Identification of Traitors", IEEE Transactions on Information Theory, 49(4):852–865, 2003. [24].S. Benedetto and G. Montorsi, "Unveiling turbo codes: some results on parallel concatenated coding", IEEE Trans. Inform. Theory, vol. IT-42, pp.409-28, March 1996. [25].S. Benedetto and G. Montorsi, "Design of parallel concatednated convolutional codes", IEEE Trans. Inform. Theory, vol. COM-44, pp.591-600, May 1996. [26].T. S. Wu and C. L. Hsu, "Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks", Computers & Security, vol. 23, pp. 120-125, 2004. [27].Wikipedia, The Free Encyclopedia, "Hash function ", Available at: http://zh. wikipedia.org/zh-tw/Hash, Accessed 12 May 2010.
摘要: 
數位浮水印用來保護及宣示數位作品的版權,其技術已臻成熟,但實用性卻不高。從軟體防護措施聯想,也不過只是在軟體說明項中註明其著作單位、時間、版本以及版權等宣示性質的字眼;然而,對於防止盜版,絕不是用說明項來遏止的,軟體絕大部分運用序號的編碼特性,來防止非法使用與追蹤盜版。相同的,對於數位作品的合法使用,數位指紋(Digital Fingerprinting)會比數位浮水印(Digital Watermarking)來得有實際效用。
與數位浮水印相同觀念的,數位指紋技術也是利用人眼無法察覺細微影像變化的特點,在不被人眼察覺的前提下,將含有特殊用途或意義的資訊以各種方式嵌入於原始數位作品當中,並期望縱使影像資料經過加解密、壓縮、無意或惡意的影像處理,所嵌入之資訊依然可以被偵測出來。
與數位浮水印不同的,數位浮水印是用來傳輸資料來源者的資訊;而數位指紋用來傳輸合法接受者的資訊,所以嵌入於數位作品的數位浮水印,每一份都是相同的;而嵌入於數位作品的數位指紋,每一份都是唯一的、不相同的,是用來代表不同的擁有者身份。
本論文中,以近來的數位浮水印技術研究[11]為基礎,從其技術中捨棄其錯誤更正碼技術,進而提出符合數位指紋特性的「SHA-256及16碼編碼與還原演算法」來探討數位指紋的研究重心-「合謀安全(Collusion Secure)」與甚少討論的「抵抗影像攻擊(Image Attack Resistant)」。

Digital Fingerprinting is one of the applications of the Digital Watermarking. To associate with software in thinking, Digital Fingerprinting embeds unique buyer identity marks to achieve tracing the illegal forger. The same as watermarking, some requirements include such properties as imperceptive, undeniable, anonymous and so on. In this thesis, we present a SHA-256 & Extended-16Bits Encoding algorithm based on the advanced technique of Kuo''s "Watermarking Scheme based on Majority Voting,DWT-DCT Composite and Error Correction Techniques"[11] to achieve collusion secure and image attack resistant.
In the later chapter, the proposed scheme will discuss the collusion secure and test on a series of attacks in geometry processing, image processing and compression. For examples, there are down-scaling, Gaussian filtering, uniform noise addition, JPEG, JPEG2000, etc. The proposed scheme will show its better performace when it don't use the turbo code.
URI: http://hdl.handle.net/11455/8903
其他識別: U0005-2307201015553000
Appears in Collections:電機工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.