期刊文献+

数字水印的信道容量研究综述 被引量:2

An Overview of the Capacity of Digital Watermarking
下载PDF
导出
摘要 该文对数字水印信道容量的研究结果进行了分析总结。文中介绍了作为基本通信系统的水印、作为边信息的水印、利用脏纸编码的水印及安全水印的信道容量。通过对水印信道容量的分析,得出了对水印的嵌入和检测算法研究具有指导意义的结论。 The diversified researches of capacity of digital watermarking are summarized in this paper. The capacity of watermarking as a basic communication system, the capacity as side information, the capacity using dirty paper encoding and the capacity of security watermarking are introduced. An effective conclusion for designing the arithmetic of embedding and detecting is found by analysis the capacity.
作者 王颖 李象霖
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第5期955-960,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2003AA144080)资助课题
关键词 数字水印 信道容量 通信模型 边信息 游戏理论 Digital watermarking, Channel capacity, Model of communication, Side information, Game theory
  • 相关文献

参考文献22

  • 1Cox I J, Miller M L, Bloom J M. Digital Watermarking. United States of America, Mordan Kaufmann Publishers, 2002, chapter 1-2.
  • 2Perez-Gonzalea F, Hernandes J R, Balado F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001,81(6): 1215- 1238.
  • 3Su J K, Eggers J J, Girod B. Capacity of digital watermarks subjected to an optimal collusion attack. European Signal Processing Conference(EUSIPCO), Tampere, Finland, September 2000.
  • 4Eggers J J, Bauml R R, Girod B.. Digital waterma, king facing attacks by amplitude scaling and additive white noise. 4^th Intl.ITG Conference on Source and Channel Coding, Berlin, Jan.2002:28 - 30.
  • 5Moulin P, O'Sullivan J A. Information-Theoretic Analysis of Information Hiding. IEEE Trans. on Information Theory, 2003,49(3): 563 - 593.
  • 6Moulin P, O'Sullivan J A. Information-theoretic analysis of watermarking, in Proceedings of the lntemational Conference on Acoustics, Speech, and Signal processing, 2000, 6:3630 - 3633.
  • 7O'Sullivan J A, Moulin P, Ettinger J M. Information-theoretic analysis of steganography. Proceedings of the IEEE International Symposium on Information Theory, Boston, Aug. 1998.
  • 8Eggers J J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE Vol.4675, Security and Watermarking of Multimedia Contents Ⅳ, San Jose, Ca., Jan.,2002.
  • 9Cachin C. An information-theoretic model for steganography.Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998:306 - 318.
  • 10傅祖芸.信息论-基础理论及应用.北京:电子工业出版社,2001:90—111.

同被引文献11

  • 1周四清.数字水印信道分类及其信道容量分析[J].计算机工程,2007,33(1):128-130. 被引量:1
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3Moulin P.The Role of Information Theory in Watermarking and Its Application to Image Watermarking[J].Signal Processing,2001,81(6):1121-1139.
  • 4Cox J,Miller M L,McKellips A L.Watermarking as Communications with Side Information[J].Proceedings of the IEEE,1999,87(7):1127-1141.
  • 5O'Sullivan J A,Moulin P,Ettinger J M.Information Theoretic Analysis of Steganography[C]//Proc.of International Symposium on Information Theory.Cambridge,MA,USA:[s.n.],1998.
  • 6Cover T M,Thomas J A.Elements of Information Theory[M].New York,USA:Wiley,1991.
  • 7Cohen A S,Lapidoth A.The Gaussian Watermarking Game[J].IEEE Trans.on Information Theory,2002,48(6):1639 -1667.
  • 8眭新光,沈蕾,燕继坤,朱中梁.基于AdaBoost的文本隐写分析[J].通信学报,2007,28(12):136-140. 被引量:4
  • 9谢建全,阳春华.大容量的信息隐藏算法[J].计算机工程,2008,34(8):167-169. 被引量:10
  • 10钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,31(3):402-405. 被引量:7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部