期刊文献+

基于数字水印的图像认证技术 被引量:1

Image authentication technology based on digital watermarking
下载PDF
导出
摘要 在信息时代,计算机技术发展迅速,防伪技术跟随着科技也在进一步提高。在这个崭新的数字媒体世界里,我们通过数字媒体资源进行着快捷便利的信息交流。但是也为我们带来了安全隐患。这些数字信息很容易被修改,不管是不是恶意的修改,都会对人们的认知造成误导或者造成其他严重的后果。基于这种情况的出现,为保护数字媒体资源,数字水印技术和图像认证技术越来越被人们所关注。本文将对基于数字水印的图像认证技术进行简单的阐述。 In the information age,as the rapid development of computer technology,anti-counterfeiting technology are further improved with science and technology.In this new world of digital media,we exchange the information fastly and conveniently through the digital media resources.But also bring us the safe hidden trouble.The digital information is easy to modify,whether malicious changes or not,will mislead people's cognitive or other serious consequences.Based on this situation,for protecting the digital media resources,the digital watermark technology and image authentication technology is more and more attention by people.This article will describe the image authentication technology based on digital watermarking.
作者 刘挺
机构地区 西安外事学院
出处 《电子测试》 2014年第6X期111-112,共2页 Electronic Test
关键词 数字水印 图像认证技术 digital watermarking Image authentication technology
  • 相关文献

参考文献2

二级参考文献33

  • 1Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
  • 2Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997
  • 3Wong P W.A public key watermark for image verification and authentication. In: Proc.of the IEEE International Conference on Image Processing (ICIP’98) [C], Chicago, Illinois, USA . 1998
  • 4Lin C Y,Chang S F.Semi -Fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II , EI’ 00[C], San Jose, CA, USA . 2000
  • 5Lin C Y,Chang S F.A robust image authentication method surviving JPEG lossy compression. In:Proceedings of SPIE International Conference onStorage and Retrieval of Image/Video Database, EI’98[C], San Jose, CA , U SA . 1998
  • 6Lin C Y,Chang S F.A robust image authentication method distinguishing JPEGcompression from malicious manipulation. . 1997
  • 7Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding—A survey. Proc. of the IEEE, Special Issue on Protection of Multimedia Content . 1999
  • 8Lin T,Delp E J.A review of fragile image watermarks. In:Multimedia and Security Workshop at ACM Multimedia 99[ C],Orlando, FL, USA . 1999
  • 9Fridrich J.Methods for detecting changes in digital images. In: IEEE Workshop on Intelligent Signal Processing and Communication Systems[C], Melbourne, Australia . 1998
  • 10Memon N,Shende S,Wong P.On the security of the YuengMintzer authentication watermark. In: Proc. of the IS&T PICS 99[C], Savanna, Georgia, USA . 1999

共引文献48

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部