期刊文献+

基于数字水印的图像认证技术 被引量:1

Image Authentication Based on Digital Watermarking
下载PDF
导出
摘要 伴随着计算机网络及通信技术的飞速发展,数字图像认证技术已成为目前研究的一个热点.对基于数字签名和基于数字水印的认证技术进行了比较,在此基础上阐述了数字水印技术的特征,认证系统框架,详细讨论了数字水印图像认证算法的研究现状,并对其未来发展方向进行了展望. With the development of Internet and communication technology, image authentication has been under active study in recent years. Both digital signature and digital watermarking can be utilized for image authentication,there are compared in this paper, then the feature of digital watermarking and frame of authentication system based on watermarking are proposed. Finally, the future development of digital watermarking for image authentication is also analyzed and conjectured in the paper.
出处 《河南科学》 2007年第6期984-987,共4页 Henan Science
关键词 图像认证 数字水印 数字签名 篡改检测 image authentication digital watermarking digital signature tamper detection
  • 相关文献

参考文献4

二级参考文献66

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 3Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 4Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 5Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 6Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 7Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 8Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 9Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 10Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441

共引文献130

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部