DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Lee, Heung-Kyu | - |
dc.contributor.advisor | 이흥규 | - |
dc.contributor.author | Kang, In-Koo | - |
dc.contributor.author | 강인구 | - |
dc.date.accessioned | 2011-12-13T05:26:26Z | - |
dc.date.available | 2011-12-13T05:26:26Z | - |
dc.date.issued | 2007 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=268740&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/33233 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 전산학전공, 2007. 8, [ vii, 99 p. ] | - |
dc.description.abstract | In the past decades, there has been an explosion in the use and distribution of digital multimedia contents. Although digital data has many advantages over analog data, service providers are reluctant to offer services in digital form because they fear unrestricted duplication and dissemination of copyrighted materials. Because of possible copyright issues, the intellectual property of digitally recorded material must be protected. Digital fingerprinting is a technology for enforcing digital rights polices whereby unique labels known as digital fingerprints are inserted into contents prior to distribution. These fingerprints can facilitate tracing of the culprits who use their content for unintended purposes. To protect contents, it is necessary that the fingerprints can be embedded using conventional watermarking techniques that are typically concerned with robustness against a variety of attacks mounted by an individual. Averaging attack is a simple and effective way to remove embedded fingerprints by averaging several fingerprinted contents. As a countermeasure against averaging attack, averaging attack resilient fingerprint codes can be used. In that fingerprint codes, there is ability to trace back to the pirates who have conducted averaging attack. That means even after averaging attack of fingerprinted contents, fingerprint codes belongs to the pirates can be extracted and identified. Incidence matrices of (s^p, s^{2p-2}, s^p, s, 0, 1) GD-PBIBD is generated in a practical and simple way to construct averaging attack resilient fingerprint codes. Advantages of this method are easy construction of fingerprint codes based on combinatorial design theory, code generation even without fundamental knowledge of combinatorial design theory such as BIBD, GD-PBIBD, etc. The proposed algorithm can generate arbitrary size of fingerprint code which are preferred to any other algorithm written on literature from business and economic point of view. Developers or researc... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | GD-PBIBD | - |
dc.subject | combinatorial design theory | - |
dc.subject | incidence matrix | - |
dc.subject | digital contents protection | - |
dc.subject | digital fingerprinting | - |
dc.subject | visual cryptography | - |
dc.subject | 지디-피비아이비디 | - |
dc.subject | 조합설계이론 | - |
dc.subject | 입사행렬 | - |
dc.subject | 디지털 콘텐츠 보호 | - |
dc.subject | 디지털 핑거프린팅 | - |
dc.subject | 비주얼크립토그래피 | - |
dc.subject | GD-PBIBD | - |
dc.subject | combinatorial design theory | - |
dc.subject | incidence matrix | - |
dc.subject | digital contents protection | - |
dc.subject | digital fingerprinting | - |
dc.subject | visual cryptography | - |
dc.subject | 지디-피비아이비디 | - |
dc.subject | 조합설계이론 | - |
dc.subject | 입사행렬 | - |
dc.subject | 디지털 콘텐츠 보호 | - |
dc.subject | 디지털 핑거프린팅 | - |
dc.subject | 비주얼크립토그래피 | - |
dc.title | Group divisible partially balanced incomplete block design based incidence matrices construction algorithms for digital contents protection | - |
dc.title.alternative | 디지털 콘텐츠 보호를 위한 그룹 분할 부분 균형 불완전 블록 디자인 입사행렬 생성 방법 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 268740/325007 | - |
dc.description.department | 한국과학기술원 : 전산학전공, | - |
dc.identifier.uid | 020045804 | - |
dc.contributor.localauthor | Lee, Heung-Kyu | - |
dc.contributor.localauthor | 이흥규 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.