期刊文献+

数字水印在数字档案馆的应用前景 被引量:4

下载PDF
导出
作者 张建明
出处 《浙江档案》 北大核心 2005年第1期18-19,共2页 Zhejiang Archives
  • 相关文献

参考文献7

二级参考文献48

  • 1Zhao J,Commun ACM,1998年,41卷,7期,67页
  • 2Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
  • 3KOC H E,Proc 1995 IEEE Workshopon Nonlinear Signal and Image Processing,1995年
  • 4Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
  • 5Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997
  • 6Wong P W.A public key watermark for image verification and authentication. In: Proc.of the IEEE International Conference on Image Processing (ICIP’98) [C], Chicago, Illinois, USA . 1998
  • 7Lin C Y,Chang S F.Semi -Fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II , EI’ 00[C], San Jose, CA, USA . 2000
  • 8Lin C Y,Chang S F.A robust image authentication method surviving JPEG lossy compression. In:Proceedings of SPIE International Conference onStorage and Retrieval of Image/Video Database, EI’98[C], San Jose, CA , U SA . 1998
  • 9Lin C Y,Chang S F.A robust image authentication method distinguishing JPEGcompression from malicious manipulation. . 1997
  • 10Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding—A survey. Proc. of the IEEE, Special Issue on Protection of Multimedia Content . 1999

共引文献201

同被引文献24

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部