請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86137
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 吳家麟 | zh_TW |
dc.contributor.advisor | Ja-Ling Wu | en |
dc.contributor.author | 李旻倫 | zh_TW |
dc.contributor.author | Ming-Lung Lee | en |
dc.date.accessioned | 2023-03-19T23:38:36Z | - |
dc.date.available | 2023-11-10 | - |
dc.date.copyright | 2022-09-23 | - |
dc.date.issued | 2022 | - |
dc.date.submitted | 2002-01-01 | - |
dc.identifier.citation | [1] Celik, M. U., Lemma, A. N., Katzenbeisser, S., & Van Der Veen, M. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Transactions on Information Forensics and Security, 3(3), 475-487, 2008.
[2] Kuribayashi, M., & Tanaka, H. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing, 14(12), 2129-2139, 2005. [3] Malvar, H. S., & Florencio, D. A. F. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4), 898-905, 2003. [4] Peng, Y.-J., Hsieh, Y.-C., Hsueh, C.-W., & Wu, J.-L. Cloud-based buyer-seller watermarking protocols. 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 2017, 2017-08-01. [5] Sun, J.-H., Lin, Y.-H., & Wu, J.-L. Secure Client Side Watermarking with Limited Key Size. In MultiMedia Modeling (pp. 13-24). Springer International Publishing, 2015. [6] Chin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai and Ming-Hwa Chan, "An efficient and anonymous buyer-seller watermarking protocol," in IEEE Transactions on Image Processing, vol. 13, no. 12, pp. 1618-1626, Dec. 2004, doi: 10.1109/TIP.2004.837553. [7] Yamamoto, T., & Kawamura, M. Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images. IEICE Transactions on Information and Systems, E98.D(7), 1306-1315, 2015. [8] N. Memon and P. Wong, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001. [9] Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessandro Piva, and Bart Preneel, “A provably secure anonymous buyer-seller watermarking protocol”, IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, Dec. 2010. [10] T. Bianchi and A. Piva, "Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues," in IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 87-96, March 2013, doi: 10.1109/MSP.2012.2228342. [11] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology—EUROCRYPT 1999 (Lecture Notes in Computer Science, no. 1592). New York: Springer, 1999, pp. 223–238. [12] A. M. C. Correia, J. C. M. Silva, N. M. B. Souto, L. A. C. Silva, A. B. Boal and A. B. Soares, "Multi-Resolution Broadcast/Multicast Systems for MBMS," in IEEE Transactions on Broadcasting, vol. 53, no. 1, pp. 224-234, March 2007, doi: 10.1109/TBC.2007.891705. [13] Jia Liu and A. Annamalai, "Multi-resolution signaling for multimedia multicasting," IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, 2004, pp. 1088-1092 Vol. 2, doi: 10.1109/VETECF.2004.1400189. [14] Zhang, Jun, Weidong Kou, and Kai Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings-Information Security 153.1 (2006): 15-18. [15] Cogranne, Rémi. "Determining JPEG image standard quality factor from the quantization tables." arXiv preprint arXiv:1802.00992 (2018). [16] A. Adelsbach, U. Huber, and A.-R. Sadeghi. Fingercasting—joint fingerprinting and decryption of broadcast messages. In Information Security and Privacy, pages 136–147. Springer, 2006. [17] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. Secure embedding of spread spectrum watermarks using look-up-tables. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on, volume 2, pages II–153–II–156, April 2007. [18] M. Khan, V. Jeoti, A. Malik, and M. Khan. A joint watermarking and encryption scheme for dct based codecs. In Communications (APCC), 2011 17th Asia-Pacific Conference on, pages 816–820, Oct 2011. [19] T. Farah, H. Hermassi, R. Rhoouma, and S. Belghith. Watermarking and encryption scheme to secure multimedia information. In Computer and Information Technology (WCCIT), 2013 World Congress on, pages 1–5. IEEE, 2013. [20] A. Piva, T. Bianchi, and A. De Rosa. Secure client-side st-dm watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13–26, March 2010. | - |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86137 | - |
dc.description.abstract | 在現代商業模式運作中,創作者產製的數位產品更傾向於部分免費開放給目標客群,目的是為了產生流量和知名度,事先試用產品也能獲取消費者的信任和增加購買意願。創作者再以提供有價值的內容或服務來獲取收益,這已經是現今非常常見的收益模式,因此在本研究中我們將過去的雲端買賣方浮水印協定改進成更適合這套商業模式的機制。引入雲端固然可帶來相當的利益,但是龐大的流量同樣對服務提供者帶來的巨大的挑戰:造成頻寬負荷、計算效率、儲存成本的急遽增長。因此,我們在雲端買賣方浮水印協定的基礎上利用了客戶端浮水印和量化指標調變兩項技術去改善上述問題。基於該協定原有的特性,利用雲端作為買賣方的軟硬體資源的提供者,而且同時也作為一個公平、安全和體驗良好的交易平台。此外,其功能還包括有推播賣方的數位產品和方便消費者選購產品等。換言之,我們提出的電子出版系統是一個對於現代商業模式有效率且平衡各方權益的機制。 | zh_TW |
dc.description.abstract | In modern business model, digital products produced by creators tend to be freely and partially open to target customers for getting notice. The purpose is to generate and increase traffic and popularity. Trial product distribution in advance can also enhance consumers' experiences and increase their willingness to buy. Creators then get revenue by selling valuable content or services to customers. This is a widespread revenue model today. In this work, we enhanced the previous Cloud-based Buyer-Seller Watermarking Protocols[4] to produce a more suitable mechanism for the Cloud-based E-publishing business model. Besides benefits brought by cloud, the considerable traffic, rapidly increasing bandwidth burden, computing efficiency, and storage costs also challenge service providers. The techniques of Secure Client-Side Watermarking and Quantization Index Modulation[7] are adopted to release the above-mentioned problems. Based on the characteristics of the pre-described protocol, the cloud is treated as a software and hardware resources provider for supporting buyers and sellers. In other words, a system operated under the proposed mechanism can act as a fair, secure, and user-friendly trading platform. It is our belief that our proposed mechanism is helpful to establish an efficient, secure, and rights balanced system for E-publishing. | en |
dc.description.provenance | Made available in DSpace on 2023-03-19T23:38:36Z (GMT). No. of bitstreams: 1 U0001-0609202216354100.pdf: 6550712 bytes, checksum: acb659bfb05af52c13c2e6773cb50564 (MD5) Previous issue date: 2022 | en |
dc.description.tableofcontents | 口試委員會審定書 i
致謝 ii 摘要 iii Abstract iv Contents v List of Figures vi List of Tables vii 1 Introduction 1 2 Preliminary and Related work 4 2.1 Notations 4 2.2 Paillier homomorphic cryptosystem 5 2.3 Lookup-Table Based Encryption 6 2.4 Client-side Embedding Method 7 2.5 Spread Spectrum Watermarking Using Quantization Index Modulation 8 2.6 Cloud-based Buyer-Seller Watermarking Protocol 11 3 Proposed Mechanism 15 3.1 Notations 17 3.2 Procedures of the Proposed Mechanism 18 3.2.1 Upload a Degraded Image 18 3.2.2 Download the Degraded Image 19 3.2.3 Buy the Image 19 3.2.4 Encrypt the Residual Image and Seller’s Watermark 19 3.2.5 Embed Two Watermarks into the Residual Image 19 3.2.6 Decryption 21 3.2.7 Identification 21 3.2.8 Dispute Resolution 21 4 Introduction to Implementation of Proposed Mechanism 22 5 Analysis and Experiment 30 5.1 Analysis of the Proposed Mechanism 30 5.2 Efficiency Analysis 31 5.2.1 Notations 31 5.2.2 Quantization Index Modulatiom method 31 5.2.3 Improved Spread-Spectrum based Watermarking Schemes 32 5.3 Secure Analysis 33 5.3.1 Identification 33 5.3.2 Watermarks leakage 33 5.4 Robustness Analysis 33 6 Conclusion 36 Bibliography 37 Appendix 41 | - |
dc.language.iso | zh_TW | - |
dc.title | 適用於電子出版系統的雲計算智財權保護機制 | zh_TW |
dc.title | Cloud-based IPRs Protection Mechanism for the E-publishing System | en |
dc.type | Thesis | - |
dc.date.schoolyear | 110-2 | - |
dc.description.degree | 碩士 | - |
dc.contributor.oralexamcommittee | 許超雲;陳文進;陳駿丞 | zh_TW |
dc.contributor.oralexamcommittee | Chau-Yun Hsu;Wen-Chin Chen;Jun-Cheng Chen | en |
dc.subject.keyword | 雲端買賣方浮水印協定,同態加密,量化指標調變,安全的客戶端浮水印,數位智慧財產權, | zh_TW |
dc.subject.keyword | Cloud-based Buyer-Seller Watermarking Protocol,Homomorphic encryption,Quantization Index Modulation,Secure Client-side Watermarking,Digital Intellectual Property Rights, | en |
dc.relation.page | 47 | - |
dc.identifier.doi | 10.6342/NTU202203199 | - |
dc.rights.note | 同意授權(全球公開) | - |
dc.date.accepted | 2022-09-07 | - |
dc.contributor.author-college | 電機資訊學院 | - |
dc.contributor.author-dept | 資訊網路與多媒體研究所 | - |
dc.date.embargo-lift | 2022-09-23 | - |
顯示於系所單位: | 資訊網路與多媒體研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-110-2.pdf | 6.4 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。