期刊文献+

基于CRC码的脆弱数字水印算法

A Fragile Watermarking Algorithm Based on CRC
下载PDF
导出
摘要 提出了一个用于珍贵作品完整性认证的脆弱数字水印算法。其特点是在认证时不需要原始水印,理论和实验结果证实所提算法具有很强的认证能力。 A fragile watermarking algorithm is presented in the paper, which is used to ensure the credibility of precious work. The characteristic of this algorithm is fragile watermark detection can be done without original watermark. Theories and experimental results demonstrate that the proposed algorithm has very strong capability of authentication.
出处 《计算机应用研究》 CSCD 北大核心 2005年第9期144-146,共3页 Application Research of Computers
基金 泉州师范学院校自选课题(校2004KJI01) 泉州师范学院大学生科研基金项目课题(2004KJ20)
关键词 脆弱数字水印 CRC码 认证 Fragile Watermarking Cyclic Redundancy Check(CRC) Authentication
  • 相关文献

参考文献6

二级参考文献52

  • 1[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 2[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 3[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 4[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 5[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 6[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 7[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.
  • 8Q Ruannaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996.8, 143 (4): 250~256
  • 9Voyatzis G, Nikolaidis N, Pitas I. Digital water-marking: An overview. In: 9th European Signal Processing Conference, Island of Rhodes, Greece, 1998, 9~12
  • 10Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio. SPIE Proceedings on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657: 194~202

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部