基于移动agent的数字水印检测
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术是智能版权保护领域的一个研究热点,数字水印与原始数据紧密结合并隐藏其中,成为源数据不可分离的一部分。数字水印的有效性依赖于从非法拷贝中所提取的证据。
     而在一个像国际互联网这样的大规模计算机网络中,信息分布在数百万台主机上,在这样的网络中如何检测水印,是一个极富挑战性的任务。本文对现有的几种解决办法进行了详细的研究分析和比较后,采取了把数字水印技术和移动Agent技术结合起来的方案。该方法最早由J.Zhao等人提出,本文在其基础上提出一种更详细的改进的系统结构,将系统分解为几个功能相对独立的模块,明确描述了各模块要实现的功能,并把移动Agent平台从系统中剥离出来,不必构建一个专用的水印agent平台,使系统更易于实现;整个系统采取消息驱动模式,使整个系统更易于扩充。
     为了方便系统的实现,本文专门讨论了移动Agent数字水印检测系统对数字水印算法的新要求,并给出其中关键算法(盲水印算法、置乱加密算法等)的实现。最后,本文在IBM AGLET移动Agent平台上,实现了一个简单的移动Agent数字水印检测系统。实验结果表明,该系统可以有效地完成大规模网络上的数字水印检测任务。
Digital watermarking has emerged as a promising technology for intellectual property rights protection. A digital watermark is integrated with the multimedia and tightly bound with the. quality of the content. The effectiveness of digital watermarks relies on the evidence extracted from the watermarks that reveal illicit copying and dissemination of stolen digital documents.
    On a large computer network such as the Internet with millions of hosts, searching watermarks from the data distributed over the network is a challenging task. After studied and compared several method, we concluded that it is an effective method to detect watermark base on mobile agent. In this dissertation, we ameliorate the method proposed by J.Zhan in 1999, divide the system into several independent block, and separate the mobile agent platform from the whole system, this make it is easier to implement the system. Message dirver mode make system easy to extend.
    In this dissertation, we discuss the new require for the new system in particular, implement the key algorithm (blind watermarking > Scrambling Algorithm) of the system. In the end of dissertation, we implement a simple but integrated system to detect watermark base on aglet(IBM's mobile agent platform). Experimental results show that this system is can achieve the task to detect watermark on large computer network effectively.
引文
1. Man Young Rhce. Cryptography and Secure Communication, McGraw-Hill Book Co.. 1994
    2. Neal Koblitz, A Course in Number and Theory and Cryptography. Spring-Verlag, 世界图书出版公司,1990
    3. W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding", IBM System Journal, Vol. 35, No. 3&4:313-335, 1996
    4. Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn. Information Hiding-A Survey, Proc. of IEEE, 87(7): 1062-1078, 1999
    5. W. Bender. Data Hiding, News in the Future. MIT Media Laboratory, Lecture Notes, 1994
    6. Q Ruanaidh J J, Dowling W J, Boland F M, Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8, 143 (4): 250-256.
    7. Kobayashi. Digital Watermarking: Historical Roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
    8. Voyatzis G, Nikolaidis N, Pitas Ⅰ. Digital watermarking: an overview. In: 9th European Signal Processing Conference, Island of Rhodes, Greece, 1998: 9-12.
    9. Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC'98 Conference in Melbourne, Australia, 1998. 11.
    10. Mahalingam Ramkumar. Data hiding in multimedia-theory and applications. [Ph. D. Degree], New Jersey, Department of Electrical and Computer Engineering, New Jersey Institute of Technology, 1999.
    11. Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. In: SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 92-99.
    12. Caronnl, Asuring ownership rights for digital images, proc. VIS95. Session
    
    "Reliable IT Systems". 1995 p251-263
    13. A.Tirkel, G.Rankin, and C.Osborne. Electronic watermark. Proc. DICTA1993. Dec. 1993. 666-672
    14. R.G.van Schyndel,A.Z.Tirkel and C.F.Osborne. A digital watermark. Proc.Int. Conf. Image Processing (ICIP). 1994. VOL.2.86-89
    15. 李国庆,深圳数字档案馆建设的理论架构及阶段性成果,《中国档案》2003年第3期
    16. W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding", IBM System Journal, Vol. 35, No. 3&4:313-335, 1996
    17. 施鹏飞等,数字水印技术的研究,信息与控制Vol.29,No.1,2000年2月,40-46
    18. BMMacq, Jean-Jacques Quisquater. Cryptology for Digital TV Broadcasting. Proceedings of the IEEE,June 1995,83(6):944-957
    19. J.J. K.O Ruanaidh, W.J.Dowling and F.M, Boland. Watermarking digital images for copyright protection. In IEE Proc. Vision. Image and Signal Processing. Aug 1996.vol. 143. 250-256
    20. I.Cox, J.Kilian, T.Leighton, and T.Shamoon. Secure spread spectrum watermarking for images,audio and video. In Proc Inter.Conf.Image Proc.Sept. 1996 vol.3. 243-246
    21. E.Koch, J.Rlndfrey and J.Zhao. Copyright protection for multimedia data.Digital Media and Electronic Publishing.Academic Press.London. 1996.203-213
    22. x.G.xia,C.G. Boncelet and G.R.Arce. A Multiresolution Watermark for Digital Images. Proc. ICIP. 1997. 548-551
    23. Wayne A. Jansen,"Intrusion detection with mobile Agents",Computer Communications 25 (2002), 1392-1401
    24. Ichiro Satoh,"A Mobile Agent-Based Framework for Active Networks",IEEE Systems, Man, and Cybernetics Conference (SMC'99) October, 1999
    25. Wen-Shyen E. Chen, Chih-Lin Hu,"A mobile Agent-based active network architecture for intelligent network control",Information Sciences 141 (2002) 3-35
    26. DAVID KOTZ, GEORGE CYBENKO,"Performance Analysis of Mobile Agents
    
    for Filtering Data Streams on Wireless Networks",
    27. Antonio Corradi,Marco Cremonini,Rebecca Montanari,and Cesare Stefanelli,"Mobile Agents Integrity for Electronic Commerce Applications",Information Systems Vol.24,No.6,pp519-533,1999
    28. ARTUR ROMAO,"Secure Electronic Payments Based on Mobile Agents",Distributed and Parallel Databases, 8, 447-470, 2000
    29. Takuya Iizuka,Angel Lau, Nonemember and Tatsuya Suda,"A Design of local resource access control for mobile Agent in PDA",IEICE TRANS. COMMUN., VOL. E84-B, No. 11 NOVEMBER 2001
    30. Jian Zhao,"A WWW Service to Embed and Prove Digital Copyright Watermarks", Proc. of the European Conference on Multimedia Applications, Services and techniques, Louvain-La-Neuve, Belgium, May 1996
    31. Daniel Augot, Jean Mark Boucqueau,Jean Francois Delaigle,et al.SecureDelivery of Images over Open networks.Proceedings of IEEE, 1999,87(7):1251~1266
    32. 崔晓瑜,程乾生,非对称数字水印,北京大学学报(自然科学版),第37卷,第5期,2001年9月,618-622
    33. Craver S,Memon N,Yeo Betal.Can invisible watermarks resolve rightful ownerships?. In:SPIE Electronic Imaging: Storage and Retrieval of Image and Video Databases, 1997,3022:310-321
    34. Craver S,Memon N,YeoBetal.Resolving rightful ownerships with invisible watermarking techniques:Limitations,attacks,and implication. IEEE Journal on Selected Areas in Communication, 1998,16(4):573-586
    35. Barni M,Bartolini F, Cappellini V etal.A DCT-domain system for robust image watermarking. Signal Processing, 1998, 66(3):357-372
    36. G. Mallat S. A theory for Multiresolution Signal Decomposition: The Wavelet Prepresentation[J]. IEEE Trans.on Pami., 1989,11 (8):674-693
    37. 伯晓晨,沈林成,常文森,一种新的盲图像水印检测算法,计算机学报,Vol.24,No.12,Dec.2001,1279-1286
    38. 伯晓晨,沈林成,常文森,基于局部平稳高斯模型的小波变换域盲图像水印检测,
    
    国防科技大学学报,Vol 23,No 6,2001,114-118
    39. Tae Young Kim, Hyuk Choi, Kiryung Lee, Taejeong Kim, "An Asymmetric Watermarking System With Many Embedding Watermarks Corresponding to One Detection Watermark", Signal Processing Letters, Volume: 11 Issue: 3, pp. 375-377, Mar. 2004.
    40. Hyuk Choi, Kiryung Lee, Taejeong Kim, "Transformed-Key Asymmetric Watermarking System", Signal Processing Letters, Volume: 11 Issue: 2, pp. 251-254, Feb. 2004.
    41. Joachim J. Eggers,Jonathan K. Su,and Bernd Girod. "Asymmetric Watermarking Schemes".URL http://www.cg.cs.tu-bs.de/v3d2/pubs.collection/DIWA_I2000 EGGERS.PDF, 2004.3
    42. 卢铁城,信息加密技术,成都:四川科学技术出版社,1989
    43. 易开祥,石教英.一种自适应二维数字水印算法,全国第二届信息隐学术研讨会论文集,pp:108-112,北京,2000.6
    44. 易开祥,数字图象加密与数字水印技术研究,浙江大学博士学位论文,2001年7月.
    45. 张云勇,移动Agent及其应用,清华大学出版社,2002
    46. 贺仁亚,程乾生(北京大学),一种用于认证的小波变换域的数字水印技术,计算机辅助设计与图形学学报,2001.9,Vol.13
    47. 吴旻升,王介生,刘慎权.图像的排列变换.计算机学报,21(6):514-519,1998
    48. 李宇寰.组合数学.北京师范大学出版社,1988
    49. 丁玮、闫伟齐、齐东旭,基于置乱与融合的数字图像隐藏技术及其应用,中国图像图形学报,2000,Vol.5(A)(8):644-649.
    50. Ding Wei, Yan Wei-Qi, Qi Dong-Xu, Digital Image Scrambling Technology Based on Gray Code, Proc. of the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec., 1999, 3:900-904.
    51. 丁玮、闫伟齐、齐东旭,基于生命游戏的数字图像置乱与数字水印技术,北方工业大学学报,2000,Vol.12(1):1-5.
    52. 齐东旭,周建成.一类新的置乱变换及其在图像信息隐藏中的应用.中国科
    
    学(E集),30(5):440-447,2000.
    53. 徐桂芳、曹敏谦 著,纯幻方的构造原理与方法,西安交通大学出版社,西安:1994
    54. 易开祥 孙鑫 石教英.一种基于混沌序列的图像加密算法.计算机辅助设计与图形学学报,2000 12(9):672-676
    55. Danny B.Lange,Mitsuru Oshima, Programming and Deploying Java Mobile Agents with Aglets,Addison-Weley, 1998
    56. Jian Zhao and Chenghui Luo "Digital Watermark Mobile Agents", 22nd National Information Systems Security Conference Proceedings, http://www.cs.dartmouth.edu/~agent/, October 1999

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700