CN107369125A - Robust watermarking detection method and device for data flow - Google Patents

Robust watermarking detection method and device for data flow Download PDF

Info

Publication number
CN107369125A
CN107369125A CN201710600765.2A CN201710600765A CN107369125A CN 107369125 A CN107369125 A CN 107369125A CN 201710600765 A CN201710600765 A CN 201710600765A CN 107369125 A CN107369125 A CN 107369125A
Authority
CN
China
Prior art keywords
data
watermark
groups
data item
difference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710600765.2A
Other languages
Chinese (zh)
Inventor
石熙
韦鹏程
朱盈贤
冉维
邹晓兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Education
Original Assignee
Chongqing University of Education
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Education filed Critical Chongqing University of Education
Priority to CN201710600765.2A priority Critical patent/CN107369125A/en
Publication of CN107369125A publication Critical patent/CN107369125A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0053Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The present invention relates to a kind of robust watermarking detection method and device for data flow, wherein method of detecting watermarks comprises the following steps:The data item for forming data flow is obtained, the data item comprises at least perception data and timestamp, and the data item for carrying watermark is determined with Probability p according to timestamp;Hash function calculating is carried out to timestamp in the data item for carrying watermark using packet key, data item is divided into by A groups and B groups according to obtained cryptographic Hash;Calculate the accumulated value of the difference of the perception data of two groups of data of A groups and B groups, and when the data item number of two groups of data is more than predetermined number, the mean difference of two groups of data is calculated, judges that watermark is present when the mean difference is more than predetermined threshold value, otherwise it is assumed that watermark is not present.The present invention determines to carry the data item of watermark and data item is grouped according to timestamp, it is ensured that the successful detection of watermark, while the resistivity to attack has been ensured again.

Description

Robust watermarking detection method and device for data flow
The application divides for entitled " robust watermarking embedding grammar and detection method and device for data flow " Case application, applying date of original application are 2017.6.13, Application No. 201710441578.4.
Technical field
The present invention relates to the robust watermarking detection method and device of a kind of water mark method, more particularly, to data flow.
Background technology
With the development of technology of Internet of things, increasing small intelligent hardware is widely used, such as bracelet, environment Detection means etc..This kind equipment can be by various sensor gathered datas, and by data buffer storage or transmission.These data Often endlessly produce, and transmitted in the form of data flow.The number gathered under the epoch of big data, many application scenarios According to possessing commercial value, therefore copyright protection is one and has to solve the problems, such as.However, this kind equipment often has one altogether Same feature, that is, resource-constrained, be specifically exactly computing resource, storage resource and finite energy.The numeral of robust Watermark is just highly suitable for the copyright protection for solving the flow data in resource constrained environment.
Digital watermarking is divided into fragile watermark and robust watermarking according to the power of its robustness.Fragile watermark to distorting sensitivity, Therefore it is commonly used to detect the integrality of watermark carrier;Robust watermarking has stronger resistivity for attack, therefore is commonly used to deposit Copyright information is stored up, makes it be not easy to be erased by common signal processing means, plays a part of copyright protection.
The data flow transmitted in resource constrained environment network is mainly numeric type data, and implementing robust watermarking may generally meet with Meet following several attack patterns:
1. intercepting, i.e., intercept Partial Fragment from endless data flow;
2. sampling, the data item in data flow is uniformly chosen with certain sample rate and forms new sampled data stream;
3. deleting, data flow is in transmitting procedure because active attack or network environment lost part data item;
4. injecting, the data item of forgery is inserted in a stream;
5. distort, in a variety of ways the perception data or timestamp of altered data item;
The target of these attacks is consistent, i.e., its hiding water is destroyed under the premise for not influenceing data use value Official seal ceases, and can not just judge the copyright information of data so that all rights reserved, realize the illegitimate target that data are usurped.
It would therefore be highly desirable to develop the robust watermarking insertion and inspection of a kind of data flow for being directed to and being transmitted in resource constrained environment network Survey method, so as to improve the resistivity to attack, play a part of copyright protection.
The content of the invention
The technical problem to be solved in the present invention is, lacks be directed to what is transmitted in resource constrained environment network in the prior art Data flow carries out the method that effectively robust watermarking is embedded and detects, there is provided a kind of robust watermarking embedding grammar for data flow And method of detecting watermarks and device.
First aspect present invention, there is provided a kind of robust watermarking embedding grammar for data flow, comprise the following steps:
Data decimation step, obtain the data item s for forming data flowi, the data item siIncluding at least perception data and Timestamp ti, wherein i is the sequence number of the data item in a stream, and selection meets the data item of below equation for for carrying water The data item of print:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Packet step, using packet key K2Hash function is carried out to timestamp in the data item for carrying watermark Calculate, the data item is included in by A groups or B groups according to obtained cryptographic Hash;
Numerical value increases and decreases step, to the perception data in A group data item increase watermark modification amount δ computing, to B group numbers According to the perception data in item reduce watermark modification amount δ computing, to realize the insertion of watermark.
Second aspect of the present invention, there is provided a kind of robust watermarking detection method for data flow, comprise the following steps:
Data determination, obtains the data item for forming data flow, and the data item comprises at least perception data with timely Between stab ti, wherein i is the sequence number of the data item in a stream, it is determined that the data item for meeting below equation is for carrying watermark Data item:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Data buffer storage step, using packet key K2Hash function is carried out to timestamp in the data item for carrying watermark Calculate, data item be divided into by A groups and B groups according to obtained cryptographic Hash, and according to it is affiliated be grouped data item is cached in corresponding to In two queues;
Difference detecting step, the accumulated value of the difference of the perception data of two groups of data of A groups and B groups is calculated, and in two groups of data Data item number when being more than predetermined number, the mean difference of two groups of data is calculated, when the mean difference is more than predetermined threshold value Judge that watermark is present, otherwise it is assumed that watermark is not present.
Third aspect present invention, there is provided a kind of robust watermarking flush mounting for data flow, including:
Data decimation module, the data item s of data flow is formed for obtainingi, the data item siIncluding at least perception data And timestamp ti, wherein i is the sequence number of the data item in a stream, and selection meets the data item of below equation for for holding Carry the data item of watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Packet module, for using packet key K2Hash is carried out to timestamp in the data item for carrying watermark Function is calculated, and the data item is included in into A groups or B groups according to obtained cryptographic Hash;
Numerical value swap modules, for the perception data in A group data item increase watermark modification amount δ computing, to B Perception data in group data item reduce watermark modification amount δ computing, to realize the insertion of watermark.
Fourth aspect present invention, there is provided a kind of robust watermarking detection means for data flow, including:
Data determining module, for obtain form data flow data item, the data item comprise at least perception data with And timestamp ti, wherein i is the sequence number of the data item in a stream, it is determined that the data item for meeting below equation is for carrying The data item of watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Data cache module, for using packet key K2Hash is carried out to timestamp in the data item for carrying watermark Function is calculated, and data item is divided into A groups and B groups according to obtained cryptographic Hash, and is cached in data item pair according to affiliated be grouped In two queues answered;
Difference detection module, the accumulated value of the difference of the perception data for calculating two groups of data of A groups and B groups, and at two groups When the data item number of data is more than predetermined number, the mean difference of two groups of data is calculated, is more than default threshold in the mean difference Judge that watermark is present during value, otherwise it is assumed that watermark is not present.
Implement the present invention, have the advantages that:The present invention selectes the data item of carrying watermark according to timestamp, Data item is grouped also according to timestamp, and timestamp is not repaiied during the insertion and detection of watermark Change, this guarantees data flow both ends can obtain identical packet, it is ensured that the successful detection of watermark, version can be played The effect of protection is weighed, while has ensured the resistivity to attack again.
Brief description of the drawings
Fig. 1 is the robust watermarking embedding grammar flow chart for data flow according to the preferred embodiment of the present invention;
Fig. 2 is the robust watermarking detection method flow chart for data flow according to the preferred embodiment of the present invention;
Fig. 3 is the module diagram according to the robust watermarking flush mounting for data flow of the preferred embodiment of the present invention;
Fig. 4 is the module diagram according to the robust watermarking detection means for data flow of the preferred embodiment of the present invention;
Fig. 5 is difference detection module in the robust watermarking detection means for data flow according to the preferred embodiment of the present invention Schematic diagram;
Fig. 6 shows the one section of temperature data stream gathered by sensor;
Fig. 7 shows the temperature data stream after embedded watermark;
Fig. 8 shows loss and false alarm rate under different statistical magnitude N;
Fig. 9 shows loss and false alarm rate under the Probability p of different watermark insertions;
Figure 10 shows loss and false alarm rate under different watermark modified values;
Figure 11 shows loss and false alarm rate under different threshold values;
Figure 12 shows the watermark detection rate under different sample rates;
Figure 13 shows the watermark detection rate under different injection rates;
Figure 14 shows the watermark detection rate under different modification rates.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is The part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained on the premise of creative work is not made, belongs to the scope of protection of the invention.
The present invention proposes 1 bit robust watermarking Copyright protection scheme in the resource constrained environment based on Patchwork. The present invention simplifies to application scenarios, and first, collecting device end is regarded as sensor node gathered data, and embedded watermark, this Invention only considers numeric type data, and this is also the main flow of such application.Data are transmitted by arbitrary network, and data item is formed Data flow arrives at terminal, is regarded as aggregation node, is pooled to a number of data item and is verified, and initial data can be with if necessary It is resumed in aggregation node.The model of this simplification highlights the resource-constrained feature of this kind equipment, does not consider go-between Transmission then embodies the diversity of Internet of Things network transmission, while only considers that the source (i.e. collection terminal) of data flow and terminal (are converged Poly- end) it enormously simplify problem.
Present invention assumes that a unlimited data flow S, its data item s from sensor node to aggregation nodeiCome from The collection each time of sensor node, siIncluding at least perception data diAnd its timestamp ti
Referring to Fig. 1, it is the robust watermarking embedding grammar flow chart for data flow according to the preferred embodiment of the present invention. As shown in figure 1, the robust watermarking embedding grammar for data flow that the embodiment provides comprises the following steps:
First, in step S101, data decimation step is performed, according to timestamp tiChosen with Probability p from data flow For carrying the data item of watermark.The step includes obtaining the data item s for forming data flow Si, data item siIncluding at least sense Primary data and timestamp ti, wherein i is sequence number of the data item in data flow S, and selection meets the data item of below equation For the data item for carrying watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability, and judging if above formula is met need to be to data item siCarry out Watermark is embedded in.Wherein Probability p determines the intensity of scheme watermark addition, means data item all in data flow if p=1 Watermark should all be added.
Discriminant function F can use arbitrary form, only need to realize data item siDiscriminant function is met with Probability p.Example Such as pass through K1With tiAs certain randomizer of state modulator, generation is uniformly distributed in the random number f between 0~1, if f<p Then discriminant function F value is 1.
Above-mentioned steps S101 shows in collection terminal, when sensor node is often completed once to sample, i.e., produces one in data flow Individual new data item siWhen, then need to judge data item s according to conditions aboveiWhether it is watermark carrier.
Then, in step s 102, packet step is performed, using packet key K2To the data for carrying watermark Timestamp carries out hash function calculating in, and the data item is included in into A groups or B groups according to obtained cryptographic Hash.
Preferably, the packet step specifically includes:
(1) cryptographic Hash is calculated by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciHashed value for output is cryptographic Hash, is a Bit String;ti For the timestamp for being used to carry the data item of watermark selected in step S101;
(2) by hashed value ciEach bit carry out XOR obtain biIf bi=1, then by data item siA groups are included in, Otherwise B groups are included in.
Finally, in step s 103, numerical value increase and decrease step is performed, increase water is carried out to the perception data in A group data item Modification amount δ computing is printed, to the perception data in B group data item reduce watermark modification amount δ computing, to realize watermark It is embedded.
Preferably, numerical value increase and decrease step specifically includes:
(1) by below equation to perception data diCarry out the perception data d ' that numerical value increase and decrease computing obtains being embedded in watermarki
d′i=di+ δ, if bi=1
d′i=di- δ, if bi=0;
(2) the data item s for having been inserted into watermark is senti', including the perception data d ' of embedded watermarkiIt is and unmodified Timestamp ti
Referring to Fig. 2, it is the robust watermarking detection method flow chart for data flow according to the preferred embodiment of the present invention. As shown in Fig. 2 the robust watermarking detection method for data flow that the embodiment provides comprises the following steps:
First, in step s 201, data determination is performed, obtains the data item for forming data flow, the data item Including at least perception data and timestamp ti, wherein i is the sequence number of the data item in a stream, it is determined that meeting below equation Data item be data item for carrying watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;Discriminant function F and selection key K1With Probability p with The function that robust watermarking uses when being embedded in is consistent with parameter.Step S201 shows in pool side, when aggregation node often receives one Individual data item siWhen, also according to timestamp tiWith selecting key K1, i.e. above-mentioned formula judges whether it is watermark carrier.
Then, in step S202, data buffer storage step is performed, using packet key K2To the data for carrying watermark Timestamp carries out hash function calculating in, and data item is divided into A groups and B groups according to obtained cryptographic Hash, and according to affiliated point Data item is cached in corresponding two queues by group.
Preferably, the data buffer storage step specifically includes:
(1) cryptographic Hash is calculated by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciFor the hashed value of output, tiIt is used for for what is selected in step S101 Carry the timestamp of the data item of watermark.Packet key K2The packet key used when being embedded in robust watermarking is consistent.
(2) by hashed value ciEach bit carry out XOR obtain biIf bi=1, then by data item siA groups are included in, Otherwise B groups are included in.It is grouped according to affiliated by data item siIt is cached in queue QaOr QbIn.QaWith QbTwo established for aggregation node Queue, it is respectively used to cache the data of A groups and B groups, is cached in QaWith QbIn data item be denoted as sa respectivelyjWith sbj
Then, in step S203, difference detecting step is performed, calculates the difference of the perception data of two groups of data of A groups and B groups Accumulated value, and when the data item number of two groups of data is more than predetermined number, calculate the mean difference of two groups of data, it is flat at this Equal difference judges that watermark is present when being more than predetermined threshold value, otherwise it is assumed that watermark is not present.
Preferably, difference detecting step includes:
(1) accumulated value of the difference of the perception data of two groups of data of A groups and B groups is calculated by below equation:
D=D+daj-dbj
Wherein dajThe data item sa for forming a team to arrange for AjPerception data, dbjFormed a team column data item sb for BjPerception data, J is data to sequence.As long as that is, queue QaWith QbNeither for sky, then both sides all dequeued data items and calculate its perceive number According to difference, add up this difference be denoted as D.
(2) number of two set of queue dequeued data item, when the quantity of difference reaches N, i.e. queue Q are countedaWith QbAll fall out During N number of data item, the mean difference α of two groups of data is calculated by below equation:
Wherein N size is schema definition, if hope obtains preferable watermark detection effect, N value should be larger.If N values are close just infinite, then
(3) it is predetermined threshold value to judge whether α > T, wherein T, and T=2 δ θ, 0 < θ < 1, δ are watermark modification amount;Such as Fruit is then to judge that watermark is present, otherwise it is assumed that watermark is not present.Because the mean difference α of the data flow of not embedded watermark Close to 0.
In preferred embodiment of the invention, it is above-mentioned that the robust watermarking detection method for data flow is additionally included in completion After the difference accumulation calculating of (1) step, initial data can be recovered by increasing and decreasing the opposite inverse operations of step S103 with numerical value.
Referring to Fig. 3, the module for the robust watermarking flush mounting for data flow according to the preferred embodiment of the present invention Schematic diagram.As shown in figure 3, the robust watermarking flush mounting 100 for data flow that the embodiment provides includes:Data decimation mould Block 110, packet module 120 and numerical value swap modules 130.Preferably, the robust watermarking flush mounting for being used for data flow 100 are located at the source of data flow, i.e. collection terminal or sensor node.
Wherein data decimation module 110 is used to obtain the data item s for forming data flow Si, data item siIncluding at least sense Primary data and timestamp ti, wherein i is sequence number of the data item in data flow S, and selection meets the data item of below equation For the data item for carrying watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability.Discriminant function F can use arbitrary form, only need reality Existing data item meets discriminant function with Probability p.Such as pass through K1With tiIt is raw as certain randomizer of state modulator Into the random number f being uniformly distributed between 0~1, if f<P then discriminant function F value be 1.
Packet module 120 is connected with data decimation module 110, for using packet key K2To for carrying watermark Data item in timestamp carry out hash function calculating, the data item is included in by A groups or B groups according to obtained cryptographic Hash.
Preferably, the packet module 120 is used to calculate cryptographic Hash by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciFor the hashed value of output, tiIt is used for for what is selected in step S101 Carry the timestamp of the data item of watermark;
The packet module 120 is also by hashed value ciEach bit carry out XOR obtain biIf bi=1, then should Data item siA groups are included in, are otherwise included in B groups.
Numerical value swap modules 130 are connected with packet module 120, for being carried out to the perception data in A group data item Increase watermark modification amount δ computing, to the perception data in B group data item reduce watermark modification amount δ computing, to realize The insertion of watermark.
Preferably, the numerical value swap modules 130 by below equation to perception data diNumerical value increase and decrease computing is carried out to obtain The perception data d ' of embedded watermarki
d′i=di+ δ, if bi=1
d′i=di- δ, if bi=0;
Then, numerical value swap modules 130 send the data item s for having been inserted into watermarki', including the perception of embedded watermark Data d 'iAnd unmodified timestamp ti
Referring to Fig. 4, the module for the robust watermarking detection means for data flow according to the preferred embodiment of the present invention Schematic diagram.As shown in figure 4, the robust watermarking flush mounting 200 for data flow that the embodiment provides includes:Data determine mould Block 210, data cache module 220 and difference detection module 230.Preferably, the robust watermarking detection means for being used for data flow 200 terminals for being located at data are pool side or aggregation node.
Data determining module 210 is used to obtain the data item for forming data flow, and the data item comprises at least perception data And timestamp ti, wherein i is the sequence number of the data item in a stream, it is determined that the data item for meeting below equation is for holding Carry the data item of watermark:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability.Discriminant function F and selection key K1With Probability p with The function that robust watermarking uses when being embedded in is consistent with parameter.
Data cache module 220 is connected with data determining module 210, for using packet key K2To for carrying watermark Data item in timestamp carry out hash function calculating, data item is divided into by A groups and B groups according to obtained cryptographic Hash, and according to Data item is cached in corresponding two queues by affiliated packet.
Specifically, the data cache module 220 calculates cryptographic Hash by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciFor the hashed value of output, tiIt is used for for what is selected in step S101 Carry the timestamp of the data item of watermark.Packet key K2The packet key used when being embedded in robust watermarking is consistent.
Then, the data cache module 220 is by hashed value ciEach bit carry out XOR obtain biIf bi=1, then By data item siA groups are included in, are otherwise included in B groups.It is grouped according to affiliated by data item siIt is cached in queue QaOr QbIn.QaWith Qb Two queues established for aggregation node, it is respectively used to cache the data of A groups and B groups, is cached in QaWith QbIn data item difference It is denoted as sajWith sbj
Difference detection module 230 is connected with data cache module 220, for calculating the perception number of two groups of data of A groups and B groups According to the accumulated value of its difference, and when the data item number of two groups of data is more than predetermined number, the mean difference of two groups of data is calculated, Judge that watermark is present when the mean difference is more than predetermined threshold value, otherwise it is assumed that watermark is not present.
Referring to Fig. 5, it is difference in the robust watermarking detection means for data flow according to the preferred embodiment of the present invention The schematic diagram of detection module.As shown in figure 5, the difference detection module 230 includes:Difference summing elements 231, difference averaging unit 232 and threshold decision unit 233.
Wherein, difference summing elements 231 be used for by below equation calculating two groups of data of A groups and B groups perception data it The accumulated value of difference:
D=D+daj-dbj
Wherein dajThe data item sa for forming a team to arrange for AjPerception data, dbjFormed a team column data item sb for BjPerception data, J is data to sequence.
Difference averaging unit 232 is connected with difference summing elements 231, for counting of two set of queue dequeued data item Number, when the quantity of difference reaches N, the mean difference α of two groups of data is calculated by below equation:
Threshold decision unit 233 is connected with difference averaging unit 232, for judging whether that α > T, wherein T are default threshold Value, and T=2 δ θ, 0 < θ < 1, δ are watermark modification amount;If it is judge that watermark is present, otherwise it is assumed that watermark is not deposited .
Embedded to the robust watermarking for data flow of the present invention below and effect of detection method is analyzed and verified.
(1) validity
The core concept of simple 1 bit robust watermarking scheme proposed by the present invention is derived from digital picture Patchwork algorithms.Probability p determines the intensity of scheme watermark addition, means data all in data flow if p=1 Xiang Jieying adds watermark.And the cryptographic Hash according to caused by data item timestamp with packet key is grouped, may be regarded as one it is random The process of selection.Two groups of data item of A, the B randomly selected in a stream, its perception data is clearly independent identically distributed, and two Group perception data difference is desired for 0 so that watermark is embedded in successfully.
The present invention selectes the data item of carrying watermark according to timestamp, and data item is divided also according to timestamp Group, and timestamp is not modified during the insertion and detection of watermark, this guarantees data flow both ends to obtain Identical packet, it is ensured that the successful detection of watermark.Certainly the present invention is it cannot be guaranteed that the number of the data item in two groups of A, B It is definitely equal, but randomly choose and make it that both quantity is substantially suitable, as long as the quantity N of statistics is larger, the detection of watermark It is unaffected.
Although the watermark capacity of this programme is only 1 bit, i.e., can only distinguishes data stream whether have embedded watermark.Although watermark Capacity very little, but for being feasible by main purpose robust watermarking of copyright protection, because the present invention can be effectively Detect whether contain copyright side's information in flow data.
(2) robustness
Robustness is the most important performance indications of robust watermarking scheme, and the present invention in background technology by for enumerating Common attack pattern analyzes the robustness of watermark of the present invention.
(1) intercept
If one section in attacker's data intercept stream, the timestamp in data flow is not tampered, therefore scheme is still The data item for choosing carrying watermark can be stabbed with passage time, is grouped according to timestamp and calculates the difference of two groups of perception datas Average.Obviously, the watermark detection process for intercepting the simple robust watermarking scheme proposed to this section has little to no effect.Certainly, If the data flow of interception is too short, the lazy weight of difference statistics, the statistical result for also resulting in average is wrong and can not detect The presence of watermark.But this too short data flow has no too big actual use value, therefore interception attack can hardly come into force.
(2) sample
By sampling, attacker can obtain some discontinuous independent data item, and combine and to form new data flow. Similarly, the not original timestamp of altered data item is sampled also.And select data item carry out watermark insertion be by selection key K1 Protection, attacker can not judge which data item carries data item for watermark, and sampling can only be carried out at random.The number of stochastical sampling Necessarily uniform according to the data item distribution in stream, belonging to two groups of A, B, quantity is also just substantially suitable.Therefore, feelings are attacked with interception Condition is similar, as long as enough watermark carrying data item can be obtained, just can therefrom detect the presence of watermark.
(3) delete
In a sense, it is a kind of same attack pattern to delete with sampling, only generally deletes attack and retain Data item it is more, and sample attack delete data item it is more.Except of course that the deletion attack of active, is also present by network rings Packet loss caused by border, but the deletion of quovis modo, it is all random that data item, which is lost,.Therefore, this is similar with sampling, only The quantity of the data item for the carrying watermark to be counted is enough, and watermark can be just detected.
(4) inject
The data item that injection is forged not is the attack meanses of a common robust watermarking being directed to, because data falsification The injection rate of item can not be excessive, and excessive injecting data item will necessarily influence the use value of initial data.Assuming that data falsification The injection rate of item is pI, and pI> 0, it means that just need to inject xp per x data itemIIndividual data item, and total data item Number is x (1+pI), wherein the data item for carrying watermark information is xp.Obviously, it is original carry watermark information data item still So can correctly it be counted, but Hash computings cause the data falsification item that newly injects of part to meet the condition of embedded watermark, There is xpIP data meet the criterion of embedded watermark.
Packet is still uniform for injecting data item, then in two groups of data of A, B, carries data item and the forgery of watermark The ratio of data item is 1:pI, then when N values are larger, mean difference is
Obviously, as long as meeting α > T, i.e.,
Watermark remains able to be detected, and on the contrary then watermark detection fails.But above analyze, excessive injecting data item The use value of initial data can be influenceed, therefore, one can consider that injection attacks influence less on watermarking project.
(5) change
First, this programme can not resist the modification to timestamp, because either the selection of watermark carrying data item is still Two groups of division is all determined by timestamp.Secondly, the modification for perception data will not affect that statistical result.
If the modified values of perception data are fixed, that is, the perception data of each data item adds a fixation Value, the average of this time difference value remain as
Wherein, da 'jWith db 'jFor the perception data of two groups of data item after modification, dt is fixed modified values.
If modified values are random, i.e., the modified values of each data item are different, are denoted as dti, now
Write following form
dtiIt is random modified values, therefrom randomly chooses two groups of necessarily independent identically distributed, two groups of difference expectations It is necessarily just 0.Therefore, when N is sufficiently large
Obviously, the modification on perception data neither influences the detection of watermark.
Generally speaking, as long as timestamp is not tampered with, robust watermarking scheme proposed by the present invention can be subjected to common attack Hit, realize the detection of watermark.
(3) expense
In terms of computing cost, most significant one is Hash computings, and this has been to realize the minimum of safety compared with encryption Expense.In terms of storage overhead, sensor node is not except when preceding data item caches other data, and aggregation node then needs Establish the data item that two queues cache two groups.But because as long as two queues are neither empty with regard to dequeued data calculating difference, and The packet of data item is random, so while aggregation node is bigger than the storage overhead of sensor node, but it is most of when And too many data item need not be cached.The present invention can also be to aggregation node queue set a upper limit, if caching Data reach this upper limit, and next data item that should be cached just directly recovers the statistics that initial data does not participate in watermark.This The detection of watermark is not interfered with equally.In terms of communication overhead, this programme is based on watermark, does not increase extra amount of communication data. Generally speaking, the expense of this programme is fully acceptable.
(4) service quality
It was found from the flow of the robust watermarking embedding grammar of the present invention, sensor node does not cache any data item, therefore The time delay of transmitting terminal all is from time delay caused by data calculating, and this is typically negligible.In pool side, Aggregation node is needed by the data cached item of queue, but has been analyzed at the expense of memory space, and buffer memory is generally little, and And the present invention limits the quantity of caching using the upper limit of queue length, caused time delay compared with existing scheme, and Acceptable.Also, in resource-constrained application scenarios, present invention, avoiding the time delay of sensor node, ensures The smoothness of data acquisition transmission and data flow it is smooth, and the limitation of generally pool side is generally few.
This programme needs to modify to gathered data, and watermark modification amount δ determines the transparency of watermark, and obvious δ The effect of the bigger watermark of value is better.First, the data after the embedded watermark of the present invention can be recovered, therefore δ has no effect on The use value of watermark.Certainly, if the data after embedded watermark are too prominent, attacker still can be caused in route of transmission Attention, so it is higher to remain desirable to watermark transparency.Fig. 6 shows the one section of temperature data stream gathered by sensor, Fig. 7 then shows the temperature data stream after watermark insertion.For temperature data stream, δ value is taken as 0.01 degree, and Fig. 7 watermark Scheme watermark modified values value is 2 δ, and as seen from the figure, embedded watermark does not produce excessive influence, transparency to the value of data flow It is still acceptable.
(5) simulated experiment
(1) Setup Experiments
Simulated experiment is carried out by Matlab, and original data stream used in experiment is gathered from IntelBerkeley research experiments The sensor that room is disposed, periodically gather the humidity with timestamp, temperature, intensity of illumination and voltage data.
The data flow tested every time only retains one kind in four kinds of sampled datas, and 100,000 data should be included in data flow , the experimental result of each project both is from the repetition of 1,000 times, and tests all use different data flows every time.
For the detection of watermark, most important two indices are loss and false alarm rate.For robust watermarking, leakage Inspection, refers to embedded in watermark and aggregation node fails to detect;And false-alarm, then refer to not being embedded in watermark and converging section Point but detects the presence of watermark.It would therefore be desirable to first loss of the testing scheme under the premise of without any attack and False alarm rate, and experimental program performance and the relation of several important parameters.
Test to robustness is then carried out according to the foregoing analysis to robustness.Attack for robust watermarking is not Influence to make watermark undetectable as far as possible on the premise of initial data use, therefore the test to watermark robustness will focus on The verification and measurement ratio of watermark under different attack patterns.The present invention is firstly used in without the relatively good one group of ginseng of performance in attack laboratory Number carrys out allocation plan, then tests one by one under various attack patterns, the situation of change of watermark detection rate.In addition, the present invention should also survey Examination is with statistical magnitude N increase, and change of the watermark detection rate under different attack patterns, this aids in determining whether to increase statistical number Whether amount can improve the verification and measurement ratio of watermark.
For the robust watermarking scheme that watermark capacity is 1 bit, each experimental result only has two kinds, that is, detect watermark or Person can't detect watermark.Therefore the either repetition of loss, false alarm rate or verification and measurement ratio all by thousands of experiments could obtain Go out.
(2) tested without attack
For watermarking project performance may influential parameter mainly have addition watermark Probability p, watermark modification amount δ, Threshold coefficient θ and difference statistical magnitude N.Wherein watermark modification amount δ is a relatively small value, such as temperature number According to δ value is taken as 0.01 degree, if 25 degree of room temperature average out to, δ value is only the 0.04% of initial data, is one to water Printthrough lightness influences little numerical value.Therefore, the present invention represents the change of this parameter with watermark modification amount δ multiple.
Fig. 8 shows the trend that loss and false alarm rate change with statistical magnitude N, and other three parameters are arranged to watermark Embedded Probability p=0.5, watermark modification measure 2 δ, and threshold coefficient θ=0.8, i.e. threshold value are T=1.6 δ.From figure 8, it is seen that N has a great influence to loss.If N values are smaller, there is the presence that larger Probability Detection does not go out watermark, but as long as N-dimensional is held one Individual larger value, such as more than 2000, hardly occur missing inspection.This is identical with analysis before, and the statistic property of scheme is exactly Establish on the statistical basis to mass data.Although false alarm rate reduces also with N increase, false alarm rate change Amplitude is smaller, and is held at less than 1%, therefore statistical magnitude N influences less on false alarm rate.
Fig. 9 shows influence of the Probability p to loss and false alarm rate for watermark insertion, and other three parameters are arranged to Statistical magnitude N=1000, watermark modification measure 2 δ, threshold coefficient θ=0.8.It was found from experimental result, Probability p is also to loss There is large effect, loss reduces with p increase.Reason is then still with statistical correlation, and p is more big, and then watermark carrier exists Selection in data flow is more intensive, and the distance between data item as carrier is nearer.And flow data gradually changes, The difference of perception data is just smaller between adjacent nearer data item, and statistics effect is better.And if p is too small, then carrier number More remote according to the distance between item in a stream, statistic property will reduce.Although false alarm rate also presents identical with loss Trend, but false alarm rate very little, therefore it is considered that influence of the Probability p to false alarm rate of watermark insertion is little.
Figure 10 shows the trend that loss changes with false alarm rate with watermark modification amount, and other three parameters are arranged to water Print embedded Probability p=0.5, statistical magnitude N=1000, threshold coefficient θ=0.8, the change of watermark modification amount then by δ until 5 δ, it is all δ integral multiple.Experimental result shows that the increase of watermark modification amount can cause loss to be reduced with false alarm rate, but needs It is noted that the modified values increase of data, the transparency of watermark just reduce, therefore this modified values can only be maintained reasonable at one Scope, it is impossible to blindly increase.
Figure 11 then shows threshold coefficient θ influence, Probability p=0.5 for being arranged to watermark insertion of other three parameters, Statistical magnitude N=1000, watermark modification measure 2 δ.Obviously, threshold coefficient θ needs to do a balance.Threshold coefficient θ increases, then Threshold value increases, then the loss rise of watermark, but false alarm rate can decline therewith, it is believed that threshold existing for detection watermark improves .But from absolute figure, false alarm rate always maintains less scope, therefore, we can slightly reduce threshold value, improve water The verification and measurement ratio of print, makes loss further reduce.
The result of four groups of experiments more than, first, influence of all parameters for scheme false alarm rate will be far smaller than Influence to loss, therefore should be preferentially to reduce loss as target in allocation plan.And for robust watermarking, dimension The detectability of water holding print is only primary goal.Secondly, watermark modification amount δ and threshold coefficient θ is required for the value of a balance, Maintain the transparency of relatively low false alarm rate and watermark.Finally, watermark insertion Probability p and watermark statistical magnitude N all directly with Statistic property is related, especially for statistical magnitude N, as long as the statistical magnitude of increase data item, for most of rational ginseng Robust watermarking scheme under number configuration can realize the detection that loss is less than 1%.This characteristic be very suitable for quantity compared with The data flow of big even endless sensor collection, as long as data constantly gather, embedded watermark can be just detected.
(3) attack experiment
To common robust watermarking attack pattern, before more detailed analysis has been made.Attacked for interception, I All experiments be built upon finite number according to the statistical result of item on, therefore to parameter watermark insertion Probability p and Experiment of the statistical magnitude N experiment namely to interception attack, as a result shows, as long as statistical magnitude reaches certain degree, cuts Attack is taken not constitute a threat to.
For sampling attack and deleting attack, a kind of same attack pattern can be regarded as, certainly, sampling attack is deleted Data volume it is bigger.Figure 12 shown under different sample rate attacks, and under different statistical magnitudes, the verification and measurement ratio of watermark Variation tendency.(i.e. each two data item retains one) is reduced to 1/5 to sample rate by 1/2, statistical magnitude N by 500 always on 5000 are raised to, other specification is the configuration of the better performances selected in being tested without attack.Experimental result shows that sampling attack is true The verification and measurement ratio of watermark is reduced in fact, it is more obvious especially when statistical magnitude is relatively low.Once however, statistical magnitude increase, scheme Verification and measurement ratio will rapidly increase, and be finally reached a higher level.
Injection attacks are not the common attack form of robust watermarking, because it is original to inject new data item meeting significant impact The use value of data.Figure 13 shows the verification and measurement ratio of watermark under different injection rates with the trend that statistical magnitude changes.Note Enter rate and rise to 40% by 10%, it is meant that every 10 data item will inject the data item of 4 forgeries, the data item of forgery Perception data value data item adjacent thereto is close.Experimental result shows that, when injection rate is relatively low, the influence to watermark detection rate is not Greatly.But injection rate, when rising to 30%, the verification and measurement ratio of watermark drastically declines, certainly with the increase watermark detection of statistical magnitude Rate improves, and still shows detectable trend.This obviously meets the analysis of previous section, and injection rate 30% still meets formula:
Then watermark is still detectable.But when injection rate rises to 40%, no longer meet above-mentioned formula, with statistical magnitude Increase, watermark detection rate rapidly have dropped on the contrary, and watermark just becomes detectable.
If wishing to maintain the availability of data certainly, the injection rate of data cannot be too high.Therefore, scheme is attacked for injection The robustness hit is also acceptable.
Theory analysis shows that scheme has stronger robustness to data modification, particularly with fixed value modification hardly The detection of watermark is influenceed, experiment also demonstrates that this analysis, is not repeated herein.Figure 14 shows modification of the scheme for random value The robustness of attack.Modification rate represents the number for the data item changed in data flow, and modified values change at random between ± 4 δ, Ensure not interfere with the use value of initial data.Experimental result is shown, when modification rate is higher, i.e., most of number in data flow During according to all being changed at random, the verification and measurement ratio of watermark is barely affected.Because the difference of random modified values is desired for 0, because As long as the quantity of this statistics is sufficiently large, this has little influence on the detection of watermark.Although relatively low modification rate significantly reduces on the contrary The verification and measurement ratio of watermark, but with statistical magnitude N increase, the verification and measurement ratio of watermark remains able to rise to a rational level.
In a word, the attack form for most robust watermarking, this present invention can maintain higher watermark detection rate. Part attack can cause the decline of watermark detection rate with the rising of attack frequency, but once increase the quantity of statistics, watermark Verification and measurement ratio will rise, and be finally reached a higher level.This is the scheme advantage based on statistics, as long as the sample of statistics This is enough, can detect watermark.
In summary, the present invention selects some data item with Probability p in data source, i.e. sensor node in data flow S As the carrier of watermark, selected data item is according to its timestamp tiTwo groups are divided into key, are denoted as A and B.In A groups Each data item its perception data increases a less numerical value δ, and the perception data of each data item is reduced identical in B groups Numerical value δ.Aggregation node chooses carrier data item, subdivided A, B group in the same way, and cumulative two groups of data item perceive number According to difference.If it is necessary, data item can after the completion of calculating difference recovers raw sensed data.When the data item of statistics When reaching certain quantity, you can judge that watermark whether there is by the average of difference.
It should be appreciated that the robust watermarking embedding grammar and method of detecting watermarks and dress for data flow of the invention The realization principle put is identical with process, therefore to the robust watermarking embedding grammar and the tool of detection method embodiment for data flow Body description is also applied for robust watermarking flush mounting and watermark detecting apparatus for data flow.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (8)

1. a kind of robust watermarking detection method for data flow, it is characterised in that comprise the following steps:
Data determination, obtains the data item for forming data flow, and the data item comprises at least perception data and timestamp ti, wherein i is the sequence number of the data item in a stream, it is determined that the data item for meeting below equation is the number for carrying watermark According to item:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Data buffer storage step, using packet key K2Hash function calculating is carried out to timestamp in the data item for carrying watermark, Data item is divided into by A groups and B groups according to obtained cryptographic Hash, and two teams corresponding to according to affiliated packet data item is cached in In row;
Difference detecting step, the accumulated value of the difference of the perception data of two groups of data of A groups and B groups is calculated, and in the number of two groups of data When being more than predetermined number according to item number, the mean difference of two groups of data is calculated, is judged when the mean difference is more than predetermined threshold value Watermark is present, otherwise it is assumed that watermark is not present.
2. the robust watermarking detection method according to claim 1 for data flow, it is characterised in that the data buffer storage Step includes:
(1) cryptographic Hash is calculated by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciFor the hashed value of output;
(2) by hashed value ciEach bit carry out XOR obtain biIf bi=1, then by data item siA groups are included in, otherwise It is included in B groups.
3. the robust watermarking detection method according to claim 1 or 2 for data flow, it is characterised in that the difference Detecting step includes:
(1) accumulated value of the difference of the perception data of two groups of data of A groups and B groups is calculated by below equation:
D=D+daj-dbj
Wherein dajThe data item sa for forming a team to arrange for AjPerception data, dbjFormed a team column data item sb for BjPerception data, j for number According to sequence;
(2) number of two set of queue dequeued data item is counted, when the quantity of difference reaches N, two groups are calculated by below equation The mean difference α of data:
<mrow> <mi>&amp;alpha;</mi> <mo>=</mo> <mfrac> <mi>D</mi> <mi>N</mi> </mfrac> <mo>=</mo> <mfrac> <mn>1</mn> <mi>N</mi> </mfrac> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mrow> <mo>(</mo> <msub> <mi>da</mi> <mi>j</mi> </msub> <mo>-</mo> <msub> <mi>db</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> <mo>;</mo> </mrow>
(3) it is predetermined threshold value to judge whether α > T, wherein T, and T=2 δ θ, 0 < θ < 1, δ are watermark modification amount;If Then judge that watermark is present, otherwise it is assumed that watermark is not present.
4. the robust watermarking detection method according to claim 3 for data flow, it is characterised in that methods described is also wrapped Include after the difference accumulation calculating of (1) step in completing difference detecting step, numerical value increase and decrease operation phase during by being embedded in watermark Anti- inverse operation recovers initial data.
A kind of 5. robust watermarking detection means for data flow, it is characterised in that including:
Data determining module, the data item of data flow is formed for obtaining, and the data item comprises at least perception data with timely Between stab ti, wherein i is the sequence number of the data item in a stream, it is determined that the data item for meeting below equation is for carrying watermark Data item:
F(p,ti,K1)==1;
Wherein F is discriminant function, K1To select key, p is probability;
Data cache module, for using packet key K2Hash function is carried out to timestamp in the data item for carrying watermark Calculate, data item be divided into by A groups and B groups according to obtained cryptographic Hash, and according to it is affiliated be grouped data item is cached in corresponding to In two queues;
Difference detection module, the accumulated value of the difference of the perception data for calculating two groups of data of A groups and B groups, and in two groups of data Data item number when being more than predetermined number, the mean difference of two groups of data is calculated, when the mean difference is more than predetermined threshold value Judge that watermark is present, otherwise it is assumed that watermark is not present.
6. the robust watermarking detection means according to claim 5 for data flow, it is characterised in that the data buffer storage Module calculates cryptographic Hash by below equation:
ci=H (ti,K2);
Wherein H is hash function, K2For packet key, ciFor the hashed value of output;
And the data cache module is by hashed value ciEach bit carry out XOR obtain biIf bi=1, then this is counted According to item siA groups are included in, are otherwise included in B groups.
7. the robust watermarking detection means for data flow according to claim 5 or 6, it is characterised in that the difference Detection module includes:
Difference summing elements, the accumulated value of the difference of the perception data for calculating two groups of data of A groups and B groups by below equation:
D=D+daj-dbj
Wherein dajThe data item sa for forming a team to arrange for AjPerception data, dbjFormed a team column data item sb for BjPerception data, j for number According to sequence;
Difference averaging unit, the number of two set of queue dequeued data item is counted, when the quantity of difference reaches N, passes through following public affairs Formula calculates the mean difference α of two groups of data:
<mrow> <mi>&amp;alpha;</mi> <mo>=</mo> <mfrac> <mi>D</mi> <mi>N</mi> </mfrac> <mo>=</mo> <mfrac> <mn>1</mn> <mi>N</mi> </mfrac> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mrow> <mo>(</mo> <msub> <mi>da</mi> <mi>j</mi> </msub> <mo>-</mo> <msub> <mi>db</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> <mo>;</mo> </mrow>
Threshold decision unit, for judging whether that α > T, wherein T are predetermined threshold value, and T=2 δ θ, 0 < θ < 1, δ is water Print modification amount;If it is judge that watermark is present, otherwise it is assumed that watermark is not present.
8. the robust watermarking detection means according to claim 7 for data flow, it is characterised in that the variance yields tires out Add unit also after difference accumulation calculating is completed, during by being embedded in watermark numerical value increase and decrease operate opposite inverse operation and recover original Data.
CN201710600765.2A 2017-06-13 2017-06-13 Robust watermarking detection method and device for data flow Pending CN107369125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710600765.2A CN107369125A (en) 2017-06-13 2017-06-13 Robust watermarking detection method and device for data flow

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710600765.2A CN107369125A (en) 2017-06-13 2017-06-13 Robust watermarking detection method and device for data flow
CN201710441578.4A CN107274331B (en) 2017-06-13 2017-06-13 Robust watermarking embedding grammar and device for data flow

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201710441578.4A Division CN107274331B (en) 2017-06-13 2017-06-13 Robust watermarking embedding grammar and device for data flow

Publications (1)

Publication Number Publication Date
CN107369125A true CN107369125A (en) 2017-11-21

Family

ID=60067510

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710441578.4A Active CN107274331B (en) 2017-06-13 2017-06-13 Robust watermarking embedding grammar and device for data flow
CN201710600765.2A Pending CN107369125A (en) 2017-06-13 2017-06-13 Robust watermarking detection method and device for data flow

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201710441578.4A Active CN107274331B (en) 2017-06-13 2017-06-13 Robust watermarking embedding grammar and device for data flow

Country Status (1)

Country Link
CN (2) CN107274331B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005175A (en) * 2018-08-07 2018-12-14 腾讯科技(深圳)有限公司 Network protection method, apparatus, server and storage medium
CN113626802A (en) * 2021-08-23 2021-11-09 重庆第二师范学院 Login verification system and method for equipment password

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494775B (en) * 2018-03-26 2020-12-15 四川长虹电器股份有限公司 Method for preventing network attack by using legal data or tampering legal data
CN111651735B (en) * 2020-05-07 2022-03-01 清华四川能源互联网研究院 Time sequence data watermarking method with timestamp alignment function
CN113095988B (en) * 2021-03-29 2022-02-01 贵州大学 Dispersion tensor image robust zero watermarking method based on ORC sampling and QGPCE conversion

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646259A (en) * 2012-02-16 2012-08-22 南京邮电大学 Anti-attack robustness multiple zero watermark method
CN102867286A (en) * 2011-07-08 2013-01-09 索尼公司 Method and device for generating, embedding and detecting digital watermarks

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3778009B2 (en) * 2001-06-13 2006-05-24 ソニー株式会社 Data transfer system, data transfer device, data recording device, and data management method
GB0317571D0 (en) * 2003-07-26 2003-08-27 Koninkl Philips Electronics Nv Content identification for broadcast media
EP2797333A1 (en) * 2013-04-26 2014-10-29 Nagravision S.A. Method for watermarking media content and system for implementing this method
CN105263024B (en) * 2015-10-15 2018-06-29 宁波大学 A kind of registration of HEVC video flowing zero watermarkings of anti-quantization transcoding and detection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867286A (en) * 2011-07-08 2013-01-09 索尼公司 Method and device for generating, embedding and detecting digital watermarks
CN102646259A (en) * 2012-02-16 2012-08-22 南京邮电大学 Anti-attack robustness multiple zero watermark method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XI SHI ETC.: "A reversible watermarking authentication scheme for wireless sensor networks", 《INFORMATION SCIENCES》 *
石熙: "数字水印技术在无线传感器网络安全中的应用研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005175A (en) * 2018-08-07 2018-12-14 腾讯科技(深圳)有限公司 Network protection method, apparatus, server and storage medium
CN113626802A (en) * 2021-08-23 2021-11-09 重庆第二师范学院 Login verification system and method for equipment password
CN113626802B (en) * 2021-08-23 2023-05-12 重庆第二师范学院 Login verification system and method for equipment password

Also Published As

Publication number Publication date
CN107274331B (en) 2018-03-13
CN107274331A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
CN107274331B (en) Robust watermarking embedding grammar and device for data flow
Gianvecchio et al. Model-based covert timing channels: Automated modeling and evasion
Sultana et al. Secure provenance transmission for streaming data
Zhang et al. Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach
CN111818103B (en) Traffic-based tracing attack path method in network target range
Walls et al. Liquid: A detection-resistant covert timing channel based on IPD shaping
Zhao et al. Detecting covert channels in computer networks based on chaos theory
CN105407096B (en) Message data detection method based on flow management
Luo et al. Robust network covert communications based on TCP and enumerative combinatorics
CN106375157B (en) A kind of network flow correlating method based on phase space reconfiguration
CN104636764B (en) A kind of image latent writing analysis method and its device
CN110300127A (en) A kind of network inbreak detection method based on deep learning, device and equipment
CN107248996A (en) A kind of detection of DNS amplification attacks and filter method
CN106878314A (en) Network malicious act detection method based on confidence level
CN107733883A (en) A kind of method and device for detecting batch registration account
CN110351291A (en) Ddos attack detection method and device based on multiple dimensioned convolutional neural networks
CN115150182B (en) Information system network attack detection method based on flow analysis
Xiao et al. Digital watermark-based independent individual certification scheme in WSNs
Lu et al. An HTTP flooding detection method based on browser behavior
CN106850658B (en) The network malicious act detection method of real-time online study
CN109583056A (en) A kind of network-combination yarn tool performance appraisal procedure and system based on emulation platform
CN109858510A (en) A kind of detection method for http protocol ETag value covert communications
CN110290110A (en) A kind of recognition methods of encryption malicious traffic stream and system based on redundancy detection framework
JP2005236862A (en) Log analyzing device and program, and recording medium
Huang et al. Mining Web User Behaviors to Detect Application Layer DDoS Attacks.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171121