請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/57101
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 吳家麟(Ja-Lin Wu) | |
dc.contributor.author | Jia-Hao Sun | en |
dc.contributor.author | 孫家豪 | zh_TW |
dc.date.accessioned | 2021-06-16T06:34:58Z | - |
dc.date.available | 2015-08-16 | |
dc.date.copyright | 2014-08-16 | |
dc.date.issued | 2014 | |
dc.date.submitted | 2014-08-02 | |
dc.identifier.citation | [1] A. Adelsbach, U. Huber, and A.-R. Sadeghi. Fingercasting—joint fingerprinting and decryption of broadcast messages. In Information Security and Privacy, pages 136–147. Springer, 2006.
[2] R. Anderson and C. Manifavas. Chameleon —a new kind of stream cipher. In E. Biham, editor, Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 107–113. Springer Berlin Heidelberg, 1997. [3] M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A dct-domain system for robust image watermarking. Signal processing, 66(3):357–372, 1998. [4] T. Bianchi and A. Piva. Secure watermarking for multimedia content protection: A review of its benefits and open issues. Signal Processing Magazine, IEEE, 30(2):87–96, March 2013. [5] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. Secure embedding of spread spectrum watermarks using look-up-tables. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on, volume 2, pages II–153–II–156, April 2007. [6] M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen. Lookup-tablebased secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security, 3(3):475–487, 2008. [7] T.-H. Chen, S.-H. Liu, H.-X. Yao, and W. Gao. Robust video watermarking based on dc coefficients of selected blocks. In Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, volume 9, pages 5273–5278. IEEE, 2005. [8] T. Farah, H. Hermassi, R. Rhoouma, and S. Belghith. Watermarking and encryption scheme to secure multimedia information. In Computer and Information Technology (WCCIT), 2013 World Congress on, pages 1–5. IEEE, 2013. [9] D. Goudia, M. Chaumont, W. Puech, and N. H. Said. A joint jpeg2000 compression and watermarking system using a tcq-based quantization scheme. In IS&T/SPIE Electronic Imaging, pages 78820C–78820C. International Society for Optics and Photonics, 2011. [10] C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in images. Image Processing, IEEE Transactions on, 8(1):58–68, Jan 1999. [11] C.-H. Huang and J.-L. Wu. Attacking visible watermarking schemes. Multimedia, IEEE Transactions on, 6(1):16–30, Feb 2004. [12] S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas. A buyer seller watermarking protocol based on secure embedding. Information Forensics and Security, IEEE Transactions on, 3(4):783–786, Dec 2008. [13] M. Khan, V. Jeoti, A. Malik, and M. Khan. A joint watermarking and encryption scheme for dct based codecs. In Communications (APCC), 2011 17th Asia-Pacific Conference on, pages 816–820, Oct 2011. [14] G. C. Langelaar, R. L. Lagendijk, and J. Biemond. Real-time labeling of mpeg-2 compressed video. Journal of Visual Communication and Image Representation, 9(4):256 – 270, 1998. [15] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 13(12):1618–1626, Dec 2004. [16] A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen. Secure watermark embedding through partial encryption. In Y. Shi and B. Jeon, editors, Digital Watermarking, volume 4283 of Lecture Notes in Computer Science, pages 433–445. Springer Berlin Heidelberg, 2006. [17] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong. Reversible image watermarking using interpolation technique. Information Forensics and Security, IEEE Transactions on, 5(1):187–193, March 2010. [18] H. S. Malvar and D. A. Florencio. Improved spread spectrum: a new modulation technique for robust watermarking. Signal Processing, IEEE Transactions on, 51(4):898–905, 2003. [19] N. Memon and P. Wong. A buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 10(4):643–649, Apr 2001. [20] A. Piva, T. Bianchi, and A. De Rosa. Secure client-side st-dm watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13–26, March 2010. [21] C.-M. Pun, J.-J. Jiang, and C. L. P. Chen. Adaptive client-side lut-based digital watermarking. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 795–799, Nov 2011. [22] J. W. Seok and J.-W. Hong. Audio watermarking for copyright protection of digital audio data. Electronics Letters, 37(1):60–61, Jan 2001. [23] F. Siebenhaar, C. Neubauer, and J. Herre. Combined compression/watermarking for audio signals. PREPRINTS-AUDIO ENGINEERING SOCIETY, 2001. [24] J. Zhang, W. Kou, and K. Fan. Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security, 153(1):15–18, 2006. [25] X. Zhang. Reversible data hiding in encrypted image. Signal Processing Letters, IEEE, 18(4):255–258, April 2011. [26] X. Zhang. Reversible data hiding with optimal value transfer. Multimedia, IEEE Transactions on, 15(2):316–325, Feb 2013. [27] B. Zhao, L. Dang, W. Kou, J. Zhang, Z. Li, and K. Fan. A watermarking scheme in the encrypted domain for watermarking protocol. In D. Pei, M. Yung, D. Lin, and C. Wu, editors, Information Security and Cryptology, volume 4990 of Lecture Notes in Computer Science, pages 442–456. Springer Berlin Heidelberg, 2008. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/57101 | - |
dc.description.abstract | 數位浮水印技術使得數位內容擁有者得以在傳送數位內容前嵌入智慧財產相關訊息於數位內容中以保護其智慧財產權。隨著數位商務快速發展,數位內容散播成為了產品派送的主流,並使得嵌入浮水印成為保護智慧財產權的必要措施。在如此龐大的系統中,安全性、計算效率、以及通訊成本成為了服務提供者巨大的挑戰。換言之,發展一套穩固、有效率的安全數位內容派送系統有其急迫的必要。本篇論文中提出了一套創新的客戶端浮水印系統。我們描述了傳統浮水印不適合用在上述的大型系統的原因,並且在新系統中提出了相對應的解決方案。由於新提出的系統可以支援可見、不可見兩種浮水印,故新系統非常適用於雲端架構的數位內容散播系統如:Google及Amazon的線上書店、Apple的iTunes、以及Netflix的串流多媒體服務。 | zh_TW |
dc.description.abstract | Digital watermarking techniques enable digital-content owners to protect their property rights by embedding right-related messages into the host content before delivery. With the rapid growth of E-commerce, digital-content broadcasting has become the main stream of product delivering, which makes watermark embedding a must for protecting the owner's property rights. In such a large service system, security, computational efficiency, and communicational overhead are the most challenging issues to service providers. In other words, there is an urgent need for developing robust and efficient watermark schemes for securing a digital content delivering system. In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T06:34:58Z (GMT). No. of bitstreams: 1 ntu-103-R01922082-1.pdf: 2418894 bytes, checksum: c9bc220b12c0621cdf6039fad49c025d (MD5) Previous issue date: 2014 | en |
dc.description.tableofcontents | 口試委員會審定書i
誌謝ii 摘要iii Abstract iv 1 Introduction 1 2 Related Work 5 3 Preliminaries 7 3.1 Lagrange Polynomial Interpolation 7 3.2 Runge’s Phenomenon and the Modified Version of Lagrange Polynomial Interpolation 8 4 The Proposed Watermarking Schemes 11 4.1 Block-diagram of The Proposed Watermarking Scheme 11 4.2 Secure Client Side Visible Watermarking 13 4.2.1 Formulation 13 4.2.2 Analyses of the proposed Secure Client Side Visible Watermark Scheme 14 4.3 Secure Client Side Invisible Watermarking 15 4.3.1 Construction 15 4.3.2 Formulation 17 4.3.3 Analyses of the Proposed Secure Client Side Invisible Watermark Scheme 18 5 Experimental Results 20 5.1 Visible Watermark Scheme 20 5.2 Invisible Watermark Scheme 24 5.2.1 Experiments on system parameters 24 5.2.2 Experiment using optimal settings 28 6 Conclusion 30 Bibliography 31 | |
dc.language.iso | zh-TW | |
dc.title | 有限長度金鑰之安全的客戶端浮水印 | zh_TW |
dc.title | Secure Client Side Watermarking with Limited Key Size | en |
dc.type | Thesis | |
dc.date.schoolyear | 102-2 | |
dc.description.degree | 碩士 | |
dc.contributor.coadvisor | 陳文進(Wen-Chin Chen) | |
dc.contributor.oralexamcommittee | 鄭文皇,胡敏君 | |
dc.subject.keyword | 密碼學,數位智慧財產權管理,浮水印,安全的客戶端浮水印,數位內容散播, | zh_TW |
dc.subject.keyword | Cryptography,Digital Right Management,Watermarking,Secure Client Side Watermarking,Digital Content Delivering, | en |
dc.relation.page | 34 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2014-08-04 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-103-1.pdf 目前未授權公開取用 | 2.36 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。