期刊文献+

一种不对称公钥数字水印算法 被引量:3

An Asymmetric Public Key Digital Watermarking Algorithm
下载PDF
导出
摘要 为了更好地进行版权保护,针对现有数字水印算法存在的缺点,提出了一种新的不对称公钥水印思想,并首先指出目前用于版权保护的鲁棒性数字水印算法所存在的缺点和不对称公钥水印算法的优点,然后提出能克服这些缺点的不对称公钥水印算法思想;同时根据算法模型的需要,设计了一种新的具有较好相关特性的伪随机序列,并对其自相关特性进行了证明;最后具体描述了所提出的算法实例,并进行了仿真试验。试验结果证明,该算法思想是可行的,所设计的算法实例具有较好的鲁棒性和较强的抗攻击能力。 A novel asymmetric public key algorithm of robust digital watermarking, which has more potential value in practice, is proposed in this paper. First, the disadvantage of common robust watermarking algorithm is discussed, and the advantage of asymmetric public key watermarking algorithm is described. Then, a kind of asymmetric public method is proposed. To implement the method, a special pseudorandom sequence used as watermark is designed. The construction method of pseudorandom sequences is proposed, and the pseudorandom sequences’ correlation characteristic is proved. Furthermore, the detail of asymmetric public key algorithm is proposed. Finally, experiments are done. Experimental results show that the algorithm is robust enough against attacks of the commonly used image processing methods. Also, experimental results show that the algorithm is robust to malicious attacks.
出处 《中国图象图形学报(A辑)》 CSCD 北大核心 2005年第3期354-359,共6页 Journal of Image and Graphics
关键词 公钥 数字水印算法 鲁棒性 抗攻击能力 版权保护 算法模型 设计 伪随机序列 自相关特性 不对称 digital watermarking, public key, pseudorandom sequences
  • 相关文献

参考文献12

二级参考文献34

  • 1KATZENBEISSER S 吴秋新等(译).信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 2吴秋新.信息伪装与数字签名[M].北京:北京邮电大学,2000..
  • 3毛琼.信息隐藏及数字水印的研究[M].北京:北京邮电大学,2000..
  • 4岳军巧.基于DSP的几个通信问题的理论研究与技术实现[M].北京:北京邮电大学,2000..
  • 5陈明奇.数字水印理论与技术研究[M].北京:北京邮电大学,2000..
  • 6[1]Pone B. The impacts of MP3 and the future of digital entertainment products. IEEE Commun. Mag., 1999, 37(9): 68~70
  • 7[2]Swanson D M, Zhu B, Tewfik H A. Multimedia data embedding and watermarking technologic. Proc. IEEE, 1998, 86(6): 1 064~1 087
  • 8[3]Langclaav C G, Sctyawan I, Lagendijk L R. Watermarking digital image and video data. IEEE Signal Processing Mag., 2000, 16(9): 20~46
  • 9[4]Podilchuk I C, Zeng W. Image-adaptive watermarking using visual models. IEEE J. Select. Areas Commun, 1998, 16(4): 525~539
  • 10[5]Hsu Chiouting, Wu Jaling. Hidden digital watermarks in images. IEEE Trans. On IP, 1999, 8(1): 58~68

共引文献104

同被引文献20

  • 1章毓晋.中国图像工程:2004[J].中国图象图形学报(A辑),2005,10(5):537-560. 被引量:24
  • 2王沛.一种有效抵抗裁剪攻击的小波域盲水印算法[J].电子与信息学报,2005,27(7):1039-1042. 被引量:1
  • 3金聪,叶俊民,许凯华,张清国.具有抗几何攻击能力的盲数字图像水印算法[J].计算机学报,2007,30(3):474-482. 被引量:18
  • 4Hwaiig Min-Shiarig,Climig Chin-Chcm,Hwaiig Kuo-Feug,A watermarking technique based on one-way hash functions [J].IEEE Transactions on Consumer Electronics, 1999,45 (2) : 286-294.
  • 5Craver S,Memon N,Yeo B L,et al.Resolving rightful ownerships with invisible watermarking techniques:limitations,attacks and implications [J].IEEE Journal on Selected Areas in Communications, 1998,16(4) :573-586.
  • 6Lin Yu-Tzu,Wu Ja-Ling,Kuo Yu-Feng.Geometric-invariant image watermarking by object-oriented embedding[J].IJCSNS International Journal of Computer Science and Network Security,2006,6(3B): 175-186.
  • 7密码编码学与网路安全:原理与实践[M].杨明,胥光辉,齐望东,等译.2版.北京:电子工业出版社,2001:136-137.
  • 8Guerrini F,Leonardi R,Barni M.Image watermarking robust against non-linear value-metric scaling based on higher order statistics[C]// IEEE International Conference on Acoustics,Speech and Signal Processing, 14-19 May 2006,5:397-400.
  • 9Dang P,Brankov J G.Digital watermarking robust to geometric distortions[J].IEEE Transactions on Image Processing,2005,14(12): 2140-2150.
  • 10Parameswaran L,Anbumani K.A content based image watermarking scheme resilient to geometric attacks[J].International Journal of Computer Science,2007,2(2) : 118-123.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部