Font Size: a A A

Research On Digital Fingerprinting And The Application In The Copyright Protection Of The Image

Posted on:2008-02-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2178360215463758Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
The widespread use of Internet and digital technology facilitates the rapid development ofmedia industry. Piracy also has become more and more a severe concern due to the easymodification, replication and redistribution of creative works in digital form. Copyrightprotection has becomes a crucial problem to be solved. The so-called digital fingerprint ischaracteristic sequences of an object that tend to distinguish it from other similar objects that canbe processed by computer. Since fingerprint has the properties of uniqueness, robustness andinvisibility, in the distribution of digital works, the merchant can embed unique buyer fingerprintinto digital media copy, and also makes it possible to identify 'traitors' who redistribute theirillegal copies and provide evidences for the court trial, thereby achieving the purpose ofcopyright protection.This thesis reviews the fingerprinting technologies firstly, and analyse the actualfingerprinting technologies. The thesis puts forward the research after analysis of the researchworks on fingerprinting at present, the based requisitions and contents of digital copyrightprotection and the primary fingerprinting systems' structure.This thesis covers information hiding and cryptograph as applied to the design of digitalfingerprinting on the fundamentals of signal processing, cryptography, coding theory andcomputational complexity. The focus is on efficient implementations of the fingerprinting schemefor copyright protection of digital multimedia in three major domains: fingerprint embedding,fingerprint coding and correlation protocol designing.In order to validate the proposed algorithms and schemes, the performance and security ofthe schemes are analyzed and verified in both theory and experiment aspects. The results showthat the proposed algorithms and schemes are effective and practicable.
Keywords/Search Tags:copyright protection, digital fingerprinting, chaos array, collusive attack, traitor tracing
PDF Full Text Request
Related items