期刊文献+

数字水印的确定性攻击方法及其解决方案 被引量:2

Aimed Attack Method and Its Resolvent in Watermarking
下载PDF
导出
摘要 在分析了常用的数字水印添加算法和攻击方法后,提出了一种新的攻击方法:带确定性的水印攻击方法。该方法是指恶意攻击者在知道了水印添加所用的水印域和添加公式后根据已有的知识进行的破坏性攻击。试验表明,如果水印算法没有明确设计抵御这种攻击,是很容易被这种攻击所破坏的。通过对确定性攻击的分析,提出了这种攻击方法的解决方案,并通过试验表明提出的解决方案对这种攻击表现出很好的鲁棒性。 This paper analyses some common using watermarking algorithms, then shows a new attack method: aimed attack method in watermarking.Aimed attack method is a kind of method that attackers use to do vicious damage with current knowledge, when they know the watermark domains and embeding equations in the embed watermarking. Experiments show that if there is no definite design to resist these attacks, watermark embedded in the data can be destroyed easily. By analyzing these attacks, a resolvent is produced, which is robust against these attacks in the experiments.
出处 《计算机应用研究》 CSCD 北大核心 2005年第3期141-143,146,共4页 Application Research of Computers
关键词 数字水印 确定性攻击 水印域 值段 Digital Watermarking Aimed Attack Watermark Domain Value Segment
  • 相关文献

参考文献9

二级参考文献56

  • 1蒋茂森 赵振全 等.概率论与数据统计简明教程[M].长春:吉林大学出版社,1986..
  • 2[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 3[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 4[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 5[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 6[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 7[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 8[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 9[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 10[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.

共引文献359

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部