Font Size: a A A

Protection For Intellectual Property In Remote-Sensing Software And Digital Remote-Sensing Imagery Copyright

Posted on:2013-01-13Degree:DoctorType:Dissertation
Country:ChinaCandidate:J J FuFull Text:PDF
GTID:1118330371959073Subject:Agricultural Remote Sensing and IT
Abstract/Summary:PDF Full Text Request
With the computer and network technology widely used in the remote sensing field, a lot of professional software and electronic data from relevant research and practice is generated. So the protection for unpublished intellectual property rights in remote sensing software and the electronic data copyright is currently an important issue. As a new type and economical way, code obfuscation can be used to protect remote sensing software intellectual property, and digital watermarking technology has provided an effective way for copyright protection of multimedia data.In remote sensing, remote sensing software is a kind of design finding, and digital remote sensing imagery is a kind of data finding. In order to achieve the protection for the both, code obfuscation technology, digital watermarking technology and the requirements of remote sensing imagery to digital watermarking are studied in this paper, and the main work and results are as follows:(1)Crossing control-flow code obfuscation technology and the corresponding compiling solution are proposed, which can effectively prevent decompile, and increase the difficulty of static analysis.A compiler built-in obfuscating technology was developed in order to protect software intellectual property and keep from reverse engineering and static analysis. Crossing control-flow code obfuscation technology and the corresponding compiling solution were presented. The control crossing principle of IF statement and WHILE loop statement were given out, which produced control blocks of multi-level exit and entry, so code control flow became more complicated. Meanwhile, the protected code block was placed in crossing control blocks to conceal the true control flow. Then the automatic anti-compile can be effectively prevented and the difficulty of software analysis was enhanced. Because crossing control flow in source code level cannot be passed by compiler, a compatible compiling method of built-in functions was presented, which made programming simple and safe. The simulation and analysis results indicated that the technology had good protection effect for source code; after compiled, the target code was slightly increased and its running efficiency was almost not affected.(2)A method for quantitatively evaluating the robustness of the obfuscated software is proposed, which can help programmers make a choice in different obfuscating schemes.Software obfuscating transformation makes reverse engineering and malicious tampering uneconomic, and contributes to the intellectual property protection. On the face of lots of obfuscating methods how to select a specific obfuscating technique or make a choice in different obfuscating schemes is very important. We propose a method for quantitatively evaluating the robustness of the obfuscated software. And we show that software robustness by obfuscating transform is reflected both by software complexity change and the increase of the code functional obscurity which are relatively independent each other. The corresponding models are constructed:system complexity model and transform obscurity model. The proposed system complexity model contains diversity of software information that can better reflect the robustness from the perspective of complexity; the transform obscurity model is used to characterize the understanding difficulty and can be adapted to complex transform application. Our method is based on the program control flow graph and use average measure value for the local code blocks to evaluate the robustness for the local secret code. Corresponding model algorithms are given, and some examples and an instance simulation demonstrate the work process for the proposed models. (3) A robust zero-watermark algorithm using the direction stability of the first principal component vector is proposed, which can be used for remote-sensing image and general image. The proposed scheme is superior in the comprehensive performance composed of robustness, withstanding diversity attack and practical application.Image gray or intensity value attack including the absolute modification of gray value, contrast adjustment and parameter histogram equalization, and combination attack can make many kinds of watermark detection approaches unsuccessful. Address these problems, in this paper, a robust zero-watermark algorithm using the direction stability of the first principal component vector is proposed, which can effectively solve the conflict between the invisibility and robustness. The direction stability of the first principal component vector is mathematically analyzed, and some experiments are performed to observe the difference of the stability in spatial domain and frequency domain. On this basis, the input image is decomposed by DT-CWT and the output two low frequency bands are segmented into non-overlapped sub-blocks, respectively. After computing the first principal component vector for each sub-block, some vector angles between that of each sub-block and a secret reference vector can be obtained. By comparing the angles from two sub-blocks with the same position in the left and right low frequency bands, zero-watermark feature extraction is accomplished. In addition, we analyze the security and robustness for the proposed scheme. Sufficient experiments with six tested images, twenty kinds of common attacks and fifty kinds of combination attacks are carried out. Simulation results show the proposed scheme is superior in the comprehensive performance composed of robustness, withstanding diversity attack and practical application.(4) A robust visual zero-watermark scheme for multi-band remote-sensing imagery is proposed, which can adapt to the large-scale, multi-band, high-fidelity of remote sensing data. The attack performance of the proposed scheme is robust and stable.With the rapid development of earth observation missions and internet, the copyright protection for more costly remote sensing imagery information has become an important issue. Due to the large-scale, multi-band, high-fidelity for remote sensing data, watermark techniques used for general images may not suit to be directly applied to it. Also, the vast majority of literatures about remote sensing watermark don't think much of the special nature of the remote sensing data. This paper specifically propose a watermarking scheme for remote sensing imagery, in which the special nature of remote sensing data, the algorithm time performance and the diversity of image attack have been taken into account. Firstly, we prove by analysis and experiments that the first singular value vector direction has the characteristic of stability. Then, according to the relevant factors affecting stability, scan algorithm of position selection for watermark embedding is established. On this basis, a zero-watermarking scheme with lower complexity for multi-band remote sensing imagery is proposed, and the time and security performance of it are analyzed. Finally, a comprehensive simulation experiment is performed by selecting 5 different scenarios of remote sensing imagery and 25 kinds of image processing, and by carrying out a series of general attack, gray attack, combination attack, band attack. Simulation results show that the proposed scheme is not only better for time performance, but also robust and stable to resist a wider range of image attacks including band attack.
Keywords/Search Tags:remote-sensing, remote-sensing imagery, software intellectual property, code obfuscation, copyright protection, digital watermarking, zero-watermarking
PDF Full Text Request
Related items