期刊文献+

数字水印技术概述 被引量:2

Summarization of Digital Watermarking
下载PDF
导出
摘要 数字水印作为一种信息安全技术,在数字信息中加入不可见标记以达到版权保护等目的。概述数字水印的基本框架,常见算法,攻击方法及对水印的性能评估,提出数字水印今后的研究发展方向。 As a kind of information security technology,digital watermarking is to embed invisible mark in order to protect copyright.An overview of digital watermarking is given,including the basic frame,the algorithm,attacting method and the evaluation.Finally,some possible new directions of digital watermarking are also stated.
作者 于海燕
机构地区 通信指挥学院
出处 《舰船电子工程》 2008年第12期159-161,188,共4页 Ship Electronic Engineering
关键词 数字水印 信息安全 版权保护 digital watermarking information security copyright protection
  • 相关文献

参考文献5

  • 1孙圣和,陆哲明.数字水印处理技术[J].电子学报,2000,28(8):85-90. 被引量:140
  • 2[2]Chen B,Womell C.W.Quantization index modula-tion:A class of provably good methods for digital wa-termarking and information embedding[J].ISIT 2000:46~52
  • 3[3]Cox I.J,Miller M.L,McKellip A.Watermarking as communications with side[J],information.Proc.1999,87(7):1127~1141
  • 4[4]孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].北京:科学出版社,2004
  • 5张静,张春田.数字图像认证技术[J].计算机科学,2003,30(3):96-99. 被引量:8

二级参考文献23

  • 1[1]Lin C-Y, Chang S-F. Issues and solutions for authenticating MPEG video. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1999
  • 2[2]Queluz M P. Authentication of digital images and video: Generic models and a new contribution. Signal Processing: Image Communication, 2001,16: 461 ~ 475
  • 3[3]Dittmann J,Steinmetz A,Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking. IEEE ICMCS'99, 1999,2: 209~213
  • 4[4]Lu C-S,Liao H-Y M. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing, 2001,10(10): 1579~1592
  • 5[5]Wolfgang R B,Delp E J. Fragile watermarking using the VW2D watermark. In: Proc of the IS&T/SPIE Conf. on Security and Watermark of Multimedia Contents, San Jose, California, 1999. 204~213
  • 6[6]Schneider M,Chang S-F. A robust content based digital signature for image authentication. In: Proc. of the IEEE Intl Conf. on Image Processing, 1996,3: 227~230
  • 7[7]Bhattacharjee S,Kutter M. Compression tolerant image authentication. In: Proc. of the IEEE Intl. Conf. on Image Processing. Vol. 1, Oct. 1998. 435~439
  • 8[8]Lou D-C,Liu J-L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46 (1): 31~39
  • 9[9]Lin C-Y,Chang S-F. A robust image authentication method surviving JPEG lossy compression. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1998
  • 10[10]Walton S. Information authentication for a slippery new age. Dr. Dobbs Journal, 1995,20(4) :18~26

共引文献147

同被引文献23

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部