期刊文献+

基于数字水印的多媒体公文安全架构 被引量:1

Security Architecture for Multimedia Document Based on Digital Watermark
下载PDF
导出
摘要 定义了多媒体公文的新概念,在分析传统电子政务安全架构的基础上,提出利用数字水印技术来提高多媒体公文的安全性,并以PDF文档为例介绍了如何利用数字水印技术来维护信息内容的创作权,弥补了电子政务系统对数字作品版权保护的不足,设计了一种新的基于数字水印的多媒体公文安全架构。 The new concept of multimedia document was defined. According to the analysis of traditional security architecture of Egovernment, a new idea about adopting the technology of digital watermarking to ensure in the security of Multimedia Document was proposed. It introduced a way how to maintain copyright protection information in PDF documents with digital watermark technology, and made up the drawback of the digital work copyright protection in E-government system; Finally, based on the digital watermark, a new security architecture of multimedia document processing system is designed.
出处 《微计算机信息》 北大核心 2007年第33期61-62,89,共3页 Control & Automation
基金 山东省科技攻关计划项目(2005GG4201009) 国家"863"计划项目(2003AA1Z2320) 鲁东大学科研项目(L20076101)
关键词 数字水印 多媒体公文 安全架构 电子政务 digital watermarking, multimedia document, security architecture, electronic government
  • 相关文献

参考文献6

二级参考文献23

  • 1吴立军,苏开乐.基于角色PMI的电子政务安全模型[J].计算机工程与应用,2004,40(31):117-119. 被引量:6
  • 2王彦,孙鹏,吕述望.一种企业机密文档分发机制[J].计算机工程,2004,30(22):27-29. 被引量:6
  • 3张志红,曹海源.基于ISA总线的轴角数字转换卡设计[J].微计算机信息,2005,21(2):127-128. 被引量:14
  • 4Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 5Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 6Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 7Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 8Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 9Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 10Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.

共引文献49

同被引文献7

  • 1卢鹏菲,詹雄泉,洪景新.基于椭圆曲线的有序多重数字签名方案[J].厦门大学学报(自然科学版),2005,44(3):341-343. 被引量:9
  • 2Itakura K, Nakamura K. A public-key cryptosystem suitable for digital mullisignature. NEC Research and Development,1983,71 (10) :128.
  • 3David P Gilliam, John D Powell, Matt Bishop. Application of lightweight formal methods to software seeurity[C].Link?ping, Sweden: Proe 14th IEEE International Workshops on Enabling Technologies,2005:160-165.
  • 4Timmis J, Knight T. Artificial Immune System: Using the hnmune System as Inspiration for Data Mining [C]. Hershey: htea Publishing Group, 2001:209-230
  • 5Nolfi S, Florano F. Learning and Evolution [J]. Autonomous Robots, 1999,7(1):89-113.
  • 6Chen S, Tung B, Schnackenberg D. The Common Inlrusion Detection Framework-data Formats [EB/OL].Internet Draft Draft-ietfcidf-data-formats-00. Txt, 1998
  • 7Polla D, McConnell J, Johnson T, et al. A Framework for Cooperative Intrusion Deetion [C]. 21st National Information Systems Security Cmfference, 1998.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部