期刊文献+

免疫数字水印技术 被引量:2

Immune Digital Watermarking Technique
下载PDF
导出
摘要 文章提出了一种数字水印实现的新思路,即免疫数字水印SRIW(Self-RecoveryimageImmunedigitalWater鄄marking)技术,并对SRIW进行了形式化描述。SRIW具有对常见水印攻击的免疫性和对载体图像的自恢复性,安全性分析表明公开算法时SRIW安全性等价于加密算法安全性。以小波域为例给出了SRIW实现方法,提出了SRIW特有的评价标准。在Matlab7.0下进行了仿真分析,实验表明SRIW能更直接有效地保护数字产品版权。 This paper proposes a new approach of digital watermarking,i.e. SRIW (Self-Recovery image Immune digital Watermarking).Its formulization description is given.SRIW is immune against ordinary watermarking attacks and SWIR can recovery the carrier image from itself.Its security analysis shows that the security of SRIW algorithms is equivalent to the security of its encryption algorithms when the SRIW algorithms are public.We give the implementation of SRIW in Wavelet Domain for exemplifying it and propose the special evaluation of SRIW. The simulation experiments on Matlab7.0 show that SRIW can protect the copyright of digital works more directly and effectively.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第19期11-13,22,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:2004AA1Z2450)
关键词 免疫性 自恢复 数字水印 immunity, self-recovery, digital watermarking
  • 相关文献

参考文献7

二级参考文献28

  • 1[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 2[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 3[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 4[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 5[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 6[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 7[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 8[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 9[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.
  • 10[10]KUGN M. StirMark[EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/,1997-11.

共引文献177

同被引文献24

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部