期刊文献+

基于数字水印的经典图像认证算法分析 被引量:1

Analysis of classic authentication algorithm based on digital watermarking
下载PDF
导出
摘要 图像认证是近几年发展起来的新技术,目前主要有2种用于图像认证的技术:基于数字签名的图像认证和基于数字水印的图像认证技术。主要针对基于数字水印的图像认证算法分类详细介绍了几种经典算法,对这几种算法各自的优缺点作出比较分析,最后对未来算法的研究工作做出了展望。 Image authentication is a new technology which has been developed in recent years. At present, digital signature and digital watermarking are the two main methods to solve the problem of image authentication. In this paper, the authors mainly study on several classic image authentication algorithms based on digital watermarking, comparing and analyzing their advantages and disadvantages. At last, the authors also make an outlook to the future work on authentication algorithm.
出处 《重庆邮电学院学报(自然科学版)》 2006年第6期770-773,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
关键词 图像认证 数字签名 数字水印 篡改检测 image authentication digital signature digital watermarking tamper detection
  • 相关文献

参考文献2

二级参考文献36

  • 1MallatStephane.信号处理的小波导引[M].北京:机械工业出版社,2002..
  • 2粘永健.基于三维小波变换的视频图像消噪研究[C]..第四届全国虚拟现实与可视化学术会议论文集[A].大连:大连海事大学出版社,2004..
  • 3吴乐南译.SALOMON David数据压缩原理与应用[M].北京:电子工业出版社,2003..
  • 4MARTIN Vetterli S, GRACE Chang, BIN Yu.Adaptive wavelet thresholding for image denoising and compression[ J]. IEEE Transactions on Image Processing, 2000,9 ( 9 ): 1532-1546.
  • 5Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
  • 6Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997
  • 7Wong P W.A public key watermark for image verification and authentication. In: Proc.of the IEEE International Conference on Image Processing (ICIP’98) [C], Chicago, Illinois, USA . 1998
  • 8Lin C Y,Chang S F.Semi -Fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II , EI’ 00[C], San Jose, CA, USA . 2000
  • 9Lin C Y,Chang S F.A robust image authentication method surviving JPEG lossy compression. In:Proceedings of SPIE International Conference onStorage and Retrieval of Image/Video Database, EI’98[C], San Jose, CA , U SA . 1998
  • 10Lin C Y,Chang S F.A robust image authentication method distinguishing JPEGcompression from malicious manipulation. . 1997

共引文献48

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部