首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
在传统的基于QIM(Quantization Index Modulation)嵌入的数字指纹系统中,由于量化步长固定,指纹系统的抗共谋性能和图像保真度较差。针对这些问题,提出一种抗共谋指纹方案,在嵌入指纹时添加随机信号到宿主信号的DCT域,根据Watson视觉模型选择量化步长。实验结果表明,与原始的QIM指纹方案相比,采用提出方案的QIM指纹系统在抗共谋能力和视觉失真度方面都具有较好的性能。  相似文献   

2.
基于整数小波变换的指纹信息嵌入方案研究   总被引:1,自引:0,他引:1  
提出量化指纹编码的思想.将指纹数据转化为二值图像嵌入文件,使攻击者难以发现指纹信息,避免了通过比对编码进行的共谋攻击;设计了整数小波变换嵌入算法,并在实验中得到较好的效果.  相似文献   

3.
基于差分网格的抗RSD攻击盲指纹方案   总被引:1,自引:0,他引:1  
为了提高数字指纹的抗综合攻击能力,构造了抗旋转、缩放、扭曲攻击(简记为RSD攻击)的数字指纹嵌入和提取策略。设计了数字指纹的空域—DCT域联合嵌入方案,给出了差分特征点的构造方法,以及基于差分特征点网格的数字指纹嵌入与提取算法,设计了高精度攻击参数辨识算法。实验结果表明,所提方案攻击参数辨识精度达到亚像素级,能抵抗缩放系数大于0.5的缩放攻击,45°角以内的任意旋转攻击,以及25°角以内的任意扭曲攻击;且指纹提取效果并不因旋转角度的增大而降低,也不因扭曲角度的增大而有明显降低。该方案提高了数字指纹的鲁棒性,使数字指纹系统在能抵抗去除攻击,剪切、平移、粘贴攻击(简称CTP攻击)的同时具备抵抗RSD攻击的能力。  相似文献   

4.
在数字指纹中,将视觉模型应用于抖动调制(DM)量化算法能够有效改善指纹图像的视觉失真,但指纹检测器并不能准确提取指纹。结合改进的视觉模型和扩展变换抖动调制方法(STDM),提出基于扩展变换的自适应量化指纹算法,以提高指纹系统的整体性能。实验结果表明,与采用视觉模型的抖动调制算法相比,基于提出算法的指纹系统具有更好的抗共谋性能和视觉保真度。  相似文献   

5.
为了提高抗联合攻击码抵抗线性组合攻击的能力,提出一种改进的基于ACC码的指纹编码方案,该改进方案的指纹由ACC码串联构造而成,嵌入算法采用基于离散余弦变换的扩频嵌入技术,并在算法中应用人类视觉模型,利用改进的硬检测算法实现合谋者追踪.理论分析和实验结果表明,改进的指纹方案提高了追踪到至少一个线性组合攻击合谋者的概率.  相似文献   

6.
数字指纹技术是一种可以追踪到非法拷贝源的数字版权保护技术,其中一种潜在的威胁就是几个合法用户共谋攻击。针对已有的抗合谋扩频正交数字指纹方案支持用户数较少的缺点,提出了一种关于扩频正交数字指纹码的扩展方案,从理论和实验上证明该方案提高了系统所能支持的用户数,并且保持了原方案较好的抗合谋性能。  相似文献   

7.
在数字媒体版权保护领域中,具有盗版追踪能力的数字指纹是解决共谋攻击问题的重要技术手段。提出一种新的连续型指纹方案——OFFO指纹:其主要思想是使用正交向量构造最优聚焦(追踪)指纹(OFF),保证在共谋攻击发生时能够以最大概率检测出至少一个共谋者。理论分析与大量实验表明,OFFO指纹不仅在性能方面优于连续型正交指纹和n-simplex指纹,而且构造简单易于实现。  相似文献   

8.
抗共谋数字指纹实现问题研究   总被引:1,自引:0,他引:1  
与数字指纹相关的指纹编码、嵌入、共谋用户识别3个环节已有一定研究成果。若数字指纹走向实用,则还需解决一个问题:抗共谋数字指纹实现问题。详细阐述了该问题的涵义;分析了抗共谋指纹编码、内容分发机制及终端消费环境对该问题的影响并探讨了相关解决方法;从通信代价、计算及存储代价等软硬件成本、安全性及实时性等方面对现有典型抗共谋数字指纹实现算法的性能进行了比较分析;最后,讨论了该领域的未来研究方向。  相似文献   

9.
基于混沌和系数均值统计特性的音频指纹方案   总被引:1,自引:1,他引:0       下载免费PDF全文
周鸿飞  杨晓元 《计算机工程》2008,34(13):142-143
提出基于混沌和小波系数统计特性的数字指纹方案。通过用户信息生成混沌映射的初值,由该初值应用混沌方法生成用户指纹,并对其重复编码。对音频信号分帧并对每帧进行加汉明窗处理,对音频帧进行离散小波变换,根据小波系数统计恒定特性将指纹嵌入到每帧中。对音频帧进行逆变换,合并所有帧得到含指纹的音频信号。实验表明,该方案有较强的鲁棒性,能抵御常见音频攻击和处理方法,且对同步攻击不敏感,可用作版权保护,也可利用指纹的抗合谋攻击特性,确定叛逆者。  相似文献   

10.
在高斯指纹系统中,指纹的嵌入与检测须服从均方失真限制,以获得较好的保真度。根据概率统计理论,分析了基于阈值相关检测的传统指纹方案中指纹编码速率、均方失真限制以及共谋人数之间的关系,并指出阈值相关检测方法的缺点,即当编码速率大于容量范围的某个值时检测器性能较差。为了解决容量限制的问题,提出一种在限定均方误差的条件下取得数字指纹基本容量的高斯指纹方案。利用互信息游戏理论,提出最大惩罚高斯互信息的指纹检测方法,有效地解决了传统指纹检测方法存在的问题。根据指纹容量的数学模型,推导出指纹容量的表达式。  相似文献   

11.
在无人机应用过程中一般使用GPS进行定位,然而在室内情况下,由于受建筑物的影响无法使用GPS.因此,设计了一种在四轴飞行器平台上基于位置指纹算法的 WiFi室内定位系统,以此来解决无人机的室内定位问题.针对WiFi信号强度易受环境影响问题,在数据采集过程中添加了Kalman滤波以改进位置指纹算法.实验结果表明,改进后的算法在定位精度上有了一定提高.  相似文献   

12.
Digital fingerprinting is a technique to deter unauthorized redistribution of multimedia content by embedding a unique identifying signal in each legally distributed copy. The embedded fingerprint can later be extracted and used to trace the originator of an unauthorized copy. A group of users may collude and attempt to create a version of the content that cannot be traced back to any of them. As multimedia data is commonly stored in compressed form, this paper addresses the problem of fingerprinting compressed signals. Analysis is carried out to show that due to the quantized nature of the host signal and the embedded fingerprint, directly extending traditional fingerprinting techniques for uncompressed signals to the compressed case leads to low collusion resistance. To overcome this problem and improve the collusion resistance, a new technique for fingerprinting compressed signals called Anti-Collusion Dither (ACD) is proposed, whereby a random dither signal is added to the compressed host before embedding so as to make the effective host signal appear more continuous. The proposed technique is shown to reduce the accuracy with which attackers can estimate the host signal, and from an information theoretic perspective, the proposed ACD technique increases the maximum number of users that can be supported by the fingerprinting system under a given attack. Both analytical and experimental studies confirm that the proposed technique increases the probability of identifying a guilty user and can approximately quadruple the collusion resistance compared to conventional Gaussian fingerprinting.   相似文献   

13.
李文杰  魏红 《微计算机信息》2006,22(20):233-234
射频指纹识别技术是一种基于网络的定位技术。信号传播时由于对地理环境的依赖性而体现出很强的站点特殊性。这样的特点被认为是对应该位置的信号指纹。利用这一点可以来确定该移动终端的位置。本文运用了神经网络模型,讨论了信号特征的选取,主要研究分析了无线定位中的射频指纹识别技术,讲述了它在无线定位中的应用过程。也讨论了其它几种现有的定位技术。  相似文献   

14.
Understanding the weaknesses and the limitations of existing digital fingerprinting schemes and designing effective collusion attacks play an important role in the development of digital fingerprinting. In this paper, we propose a collusion attack optimization framework for spread-spectrum (SS) fingerprinting. Our framework is based upon the closed-loop feedback control theory. In the framework, we at first define a measure function to test whether the fingerprint presents in the attacked signal after collusion. Then, an optimization mechanism is introduced to attenuate the fingerprints from the forgery. We evaluate the performance of the proposed framework for three different SS-based embedding methods. The experimental results show that the proposed framework is more effective than the other examined collusion attacks. About three pieces of fingerprinted content are able to interrupt the fingerprinting system which accommodates about 1000 users, if we require the detection probability to be less than 0.9. Meanwhile, a high fidelity of the attacked content is retained.  相似文献   

15.
An indoor positioning system that uses a location fingerprinting technique based on the received signal strength of a wireless local area network is an enabler for indoor location-aware computing. Data analysis of the received signal strength indication is very essential for understanding the underlying location-dependent features and patterns of location fingerprints. This knowledge can assist a system designer in accurately modeling a positioning system, improving positioning performance, and efficiently designing such a system. This study investigates extensively through measurements, the features of the received signal strength indication reported by IEEE 802.11b/g wireless network interface cards. The results of the statistical data analysis help in identifying a number of phenomena that affect the precision and accuracy of indoor positioning systems.  相似文献   

16.
基于指纹技术的蓝牙室内定位系统   总被引:9,自引:1,他引:8  
针对室内定位服务的迫切需求,搭建了利用指纹技术实现对室内蓝牙设备的精确定位系统。该系统以蓝牙设备为平台,通过获取蓝牙无线链路的接收信号强度参数,建立信号样本数据库,对在线阶段采集到的信号利用K阶近邻法实现对设备的定位。该系统在传统指纹定位算法的基础上加入了对在线定位阶段信号的小波去噪过程,用于降低噪声干扰,提高定位精度。在办公室环境下,蓝牙设备的平均定位精度达到了0.2 m。  相似文献   

17.
多传感器辅助的WiFi信号指纹室内定位技术   总被引:1,自引:0,他引:1  
石柯  宋小妹  王信达  呼文彪 《软件学报》2019,30(11):3457-3468
近年来,基于室内定位的应用服务越来越普及,吸引了大量的研究工作.其中,基于WiFi信号指纹的室内定位技术发展尤为迅速.但无线信号传输易受环境影响,会导致WiFi信号指纹定位存在偏差.为了提高定位精度并减小环境因素带来的不利影响,提出了智能手机内置传感器辅助WiFi信号指纹定位的方法,即利用智能设备上内置的传感器如加速计、陀螺仪等采集数据,计算得到用户轨迹信息和轨迹可信度,将轨迹信息与信号指纹信息结合起来建立综合概率模型,进行位置匹配,确定最近参考点.实验结果表明,与经典WiFi信号指纹定位方法相比,利用传感器所估测的用户轨迹信息能够有效应对环境变化的影响,提高平均定位精度.  相似文献   

18.
利用数字指纹能够追踪非法使用多媒体内容用户。为此提出一种结合OFFO(正交向量构造最优聚焦指纹)指纹和BIBD(均衡不完全区组设计)编码的数字指纹方案。该方案以连续型OFFO指纹为基向量原型,并在保持不同指纹码间距离不变的情况下把连续型指纹量化为二值指纹,然后利用BIBD编码构造出新的多层编码指纹方案。理论分析和实验结果表明,与同类指纹方案相比,新的指纹方案在用户容量相同的情况下有更好的抗共谋攻击能力。  相似文献   

19.

In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and probability of error are derived and then used in an optimization technique based on the Lagrange multipliers method to find the optimal values for the parameters of the parametric QIM that ensure the imperceptibility while maximizing the robustness under an additive white Gaussian noise (AWGN) attack. Moreover, a fast scheme for the implementation of the proposed watermarking technique is developed and an efficient procedure is suggested to find the interval for the best selection of the watermark embedding positions that provide a good trade-off between the effects of high and low pass filtering attacks. The parameters of the resulting optimal parametric QIM coupled with the embedding positions constitute a highly robust secret key for the proposed watermarking technique. We also carry out several experiments to show the usefulness of the theoretical analysis presented in the paper and compare the proposed technique with other existing QIM-based watermarking techniques by considering known attacks such as AWGN, re-quantization, resampling, low/high pass filtering, amplitude scaling and common lossy compressions.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号