首页> 外文学位 >Methodologies for access control and fingerprinting of multimedia.
【24h】

Methodologies for access control and fingerprinting of multimedia.

机译:多媒体访问控制和指纹识别的方法。

获取原文
获取原文并翻译 | 示例

摘要

This thesis deals with design strategies for access control and traitor tracing. Inspired by the chameleon cipher, a joint fingerprinting and decryption (JFD) architecture is proposed as a computational and bandwidth efficient solution for securing multicast content and tracing pirates. In JFD, slightly different decryption keys are derived from a single encryption key and this structural difference is responsible for casting a fingerprint at the receiver. Based on this methodology a DCT sign bit encryption and fingerprinting algorithm is proposed for protecting and tracking JPEG compressed images in a multicast environment.; One powerful attack within the JFD framework is collusion, in which a group of pirates collude their decryption keys or their fingerprinted copies to remove traces of the fingerprint. Such attacks can be deterred by integrating anti-collusion codes (ACCs) into the decryption key design. The size and effectiveness of an ACC codebook depends on the watermark modulation strategy used and the collusion attack model. In this thesis, we construct an ACC tailored specifically to resist linear collusion attacks, but can also be used against other forms of non-linear collusion such as median, min and max functions. The proposed codebook requires O(n) basis vectors for tracking any K n colluders in a group of n users. All the codewords within this codebook are maximally equidistant with constant weight and can be built using (v, v+1 2, v+1 4 )-BIBDs derived from Hadamard matrices.; Finally we explore the problem of traitor tracing within a n -out-of-n joint access framework, where every subset of n users is treated as a traitor set and must be tracked. As a first step in the investigation we propose a non-perfect secret sharing algorithm called MIX-SPLIT for both access control and tracking. In MIX-SPLIT, every share of the secret has a unique signature which can be used to identify the owner. There is also a unique association between any two shares, which facilitates tracking. One application for MIX-SPLIT is joint access and tracking of highly sensitive data such as medical images. This algorithm can also be engineered to create mixed shares of two different information pieces such as different biometric PINS in applications which require secure PIN storage.
机译:本文研究了访问控制和叛逆者追踪的设计策略。受变色密码的启发,提出了一种联合指纹识别和解密(JFD)架构,以作为一种计算和带宽有效的解决方案,用于保护多播内容和跟踪海盗行为。在JFD中,从单个加密密钥派生出略有不同的解密密钥,并且这种结构上的差异负责在接收方处投射指纹。在此方法的基础上,提出了一种DCT符号位加密和指纹识别算法,用于在组播环境中保护和跟踪JPEG压缩图像。 JFD框架中的一种强大攻击是串通,其中一群盗版者串通其解密密钥或指纹副本以去除指纹痕迹。通过将反共谋代码(ACC)集成到解密密钥设计中,可以阻止此类攻击。 ACC码本的大小和有效性取决于所使用的水印调制策略和共谋攻击模型。在本文中,我们构建了专门针对线性共谋攻击而设计的ACC,但它也可用于其他形式的非线性共谋攻击,例如中位数,最小和最大函数。所提出的码本需要O(n)个基向量来跟踪n个用户组中的任何K

著录项

  • 作者

    Karthik, Kannan.;

  • 作者单位

    University of Toronto (Canada).;

  • 授予单位 University of Toronto (Canada).;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 132 p.
  • 总页数 132
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号