期刊文献+

脆弱性数字文档水印技术 被引量:2

On Fragile Document Watermarking Technique
下载PDF
导出
摘要 网络和信息技术的发展,使得大量的纸质文档可以以数字文档形式进行保存和传输,于是如何保证数字文档的真实性和完整性成为一个急需解决的问题.脆弱性文档水印技术的发展,为解决这一问题提供了重要途径.该文介绍脆弱性数字文档水印的基本概念和研究现状,重点分析脆弱性文档水印各种算法,比较其优缺点;最后指出了脆弱性数字文档水印技术今后的发展方向. With the development of the network and information technologies, many paper documents can be saved and transformed in digital form. So how to protect the truth and the integrity of the digital documents is in dire need. The development of the fragile text watermarking technique provides an important method to resolve this issue. In this paper, the concept of the fragile document watermarking is introduced and the curium research states are studied, with emphasis on the existing algorithms and the comparisons of their advantages and disadvantages. Finally the authors point out the future research directions for fragile document watermarking techniques.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2008年第1期81-85,共5页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 陕西省自然科学基金(2004F10) 陕西省教育厅专项基金(05JK260)资助项目
关键词 文档水印 脆弱水印 文档安全 document watermarking fragile watermarking documents security
  • 相关文献

参考文献27

二级参考文献147

  • 1刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方法[J].东南大学学报(自然科学版),2003,33(z1):98-101. 被引量:16
  • 2侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 3王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 4王洪涛,王京.基于直接状态空间理论的H_∞鲁棒控制器设计方法及实例[J].微计算机信息,2005,21(1):39-40. 被引量:14
  • 5[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 6[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 7[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 8[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 9[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 10[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.

共引文献335

同被引文献21

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部