【24h】

Security of Copy-Control Watermarks

机译:复制控制水印的安全性

获取原文

摘要

Digital watermarks are typically used in copy-control applications to communicate copy management information across analog interfaces. Alternatively they are used across unencrypted digital interfaces or for non-credentialed encryption systems. Compliant devices extract copy management information and prevent illicit use of copyrighted content. Attacker may try to remove watermarks, distort them beyond recognition or bypass extractor. Security challenges are so big that some researches believe that it is na茂ve to relay on copy-control watermarks. In this paper we will show how to improve security of watermarking system and make attacks unreliable, attacked content unappealing, and/or attack procedure too burdensome for typical consumer. First we will review our experience with audio watermarks for DVD-Audio and Secure Digital Music Initiative (SDMI) architectures. Next we will consider major attack classes, such as circumvention attacks, blind attacks, and informed attacks. Then we will propose a number of security enhancement measures. One technique is based on uncoordinated selection of hiding places between embedders and extractors, with statistical analysis of expected matches. This approach reduces the repeatability of attacks and opens up the possibility of system renewal. Other security measures are based on weak watermark detections, time diversity extraction, weight accumulation, soft decision decoding, and extraction expansion or focusing. Finally, we propose methods to conceal watermark presence, location and properties using random embedding, extraction and reporting, and random host signal modification techniques designed to counter differential analysis or scrambling attacks.
机译:数字水印通常用于复制控制应用程序,以通过模拟接口传送复制管理信息。或者,它们被跨越未加密的数字接口或非凭据加密系统使用。兼容设备提取复制管理信息并防止非法使用受版权保护的内容。攻击者可能会尝试删除水印,扭曲超越识别或旁路提取器。安全挑战是如此之大,即一些研究认为,在复制控制水印上的继电器是na ve。在本文中,我们将展示如何提高水印系统的安全性,并使攻击不可靠,攻击内容不吸引,以及典型消费者的攻击程序过度繁重。首先,我们将审查我们对DVD-Audio和安全数字音乐计划(SDMI)架构的音频水印的体验。接下来,我们将考虑主要攻击课程,例如规避攻击,盲目攻击和知情攻击。然后我们将提出一些安全的增强措施。一种技术是基于嵌入者和提取器之间的隐藏位置的未计算选择,具有预期匹配的统计分析。这种方法可降低攻击的可重复性,并开辟系统续订的可能性。其他安全措施基于弱水印检测,时间分集提取,重量累积,软判决解码和提取膨胀或聚焦。最后,我们提出了使用随机嵌入,提取和报告的水印存在,位置和性能的方法,以及旨在对差分分析或加扰攻击的随机主机信号修改技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号