Project/Area Number |
10450147
|
Research Category |
Grant-in-Aid for Scientific Research (B)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
情報通信工学
|
Research Institution | The University of Tokyo |
Principal Investigator |
IMAI Hideki IIS, Univ. of Tokyo, 3rd Dept., Professor, 生産技術研究所, 教授 (70017987)
|
Co-Investigator(Kenkyū-buntansha) |
MATSUURA Kanta IIS, Univ. of Tokyo, 3rd Dept., Lecturer, 生産技術研究所, 講師 (00292756)
|
Project Period (FY) |
1998 – 1999
|
Project Status |
Completed (Fiscal Year 1999)
|
Budget Amount *help |
¥12,200,000 (Direct Cost: ¥12,200,000)
Fiscal Year 1999: ¥6,600,000 (Direct Cost: ¥6,600,000)
Fiscal Year 1998: ¥5,600,000 (Direct Cost: ¥5,600,000)
|
Keywords | Copyright protection / Digital watermark / Information security / Multimedia / Network / Electronic commerce |
Research Abstract |
Study on the relation between image distortion and channel capacity of digital watermarking By simplifying the model of the digital watermarking, we theoretically investigated the relation among the difficulty of removing a digital watermark, the amount of embedded information and the distortion of the image. As a consequence, we obtained the relation between the channel capacity of a digital watermark (the amount of remaining in formation after an attack) and the distortion of the image. Study of asymmetric digital watermarking We proposed an idea of asymmetric digital watermarking where embedding algorithm is not the same as extracting one. That ensures the difficulty of removing a digital watermark even if the extracting method is open to the public. A concrete method was proposed and then its resistance was evaluated against some attacks. Study on efficient digital movie watermarking We proposed a digital watermarking method suitable for MPEG movie that requires no original image in the extraction phase. It embeds a watermark with small cost since it requires no decoding/re-encoding procedure in embedding. We evaluated its robustness against practical attacks, such as re-encoding attacks and signal processing attacks. Using patchwork technique with watermarking, it became robust against geometric attacks, such as rotation. Study on a secure content-distribution protocol and a secure traitor-tracing scheme against malicious providers We proposed a secure information-distribution protocol that can trace a traitor who leaked the distributed information. And then, we proposed applying it to both a secure content-distribution protocol and a secure traitor tracing scheme which are secure against malicious providers.
|