期刊文献+

多媒体内容认证技术研究

The Research of Multimedia Content Authentication Technology
下载PDF
导出
摘要 内容认证技术对多媒体在传播过程中感知内容的真实性、完整性和原始性进行鉴定。国内外学者已经提出了很多认证算法,但基础理论的缺乏制约着研究工作的进一步开展。本文从认证技术的内在规律出发,定义了内容认证系统基本概念和表达符号,指出了认证系统的性能评价体系和方法。这些方法可以简单明确的对认证系统进行表达与分析,可以作为多媒体内容认证进一步研究的基础。 The Content Authentication Technology verifying the reality, the completeness and the originality of multimedia in the process of communication. Many algorithms have been proposed, but the lack of basic theory restricts the development of future research works. We first defined the basic concepts and express symbol of Content Authentication System. Then the performance analysis methods of authentication system are introduced. These methods can clearly express and analyze an authentication system, and can be a base of content authentication technology research.
出处 《应用能源技术》 2009年第6期44-47,共4页 Applied Energy Technology
关键词 多媒体 内容认证 概念定义 性能分析 Multimedia Content Authentication Concept Define Performance Analysis
  • 相关文献

参考文献11

  • 1Schneider M, Chang Shih- Fu. A Robust Content Based Digital Signature For Image Authentication[ C]. Proc IEEE international Conf on Image Processing, Laussane, Switzerland: Oct, 1996: 227- 230.
  • 2Boyatzis G, Pitas I. The use of watermarks in the protection of digital multimedia products [ J ]. Proceedings of IEEE, 1999, 87(7): 1197-1207.
  • 3Martinian E, Chen B, Womell G W.An information theoretic approach to the authentication of multimedia[ C ]. In: the Proceeding of SPIE Conference on Electronic Imaging, San Jose, CA: 2001.185 - 196.
  • 4Martinian E, Womell G W. Multimedia content authentication: fundamental limit[ C] .in: the Proceeding oflnterna- tional Conference on Image Processing, Rochester, NY: 2002.17 - 20.
  • 5Martinian E, WomeU G W, Chen B. Authentication with distortion criteria [ J ]. IEEE Transactions on Information Theory, 2005, 51(7): 2523- 2542.
  • 6叶登攀,戴跃伟,王执铨.基于水印技术的多媒体认证系统模型研究[C].见:2005全国自动化新技术学术交流会论文集(二),2005.
  • 7Tan PangNing, Steinbaeh Miehael, Kumar Vipin. Introduction to Data Milling[M].数据挖掘导论,范明,范宏建,等译.北京:人民邮电出版社,2006:38-50.
  • 8田间,陈善学.数字水印技术与图像认证技术综述[J].通信技术,2007,40(12):253-255. 被引量:6
  • 9Han Shuihua, Chu Chao - Hsien, Yang Shuangyuan. Content- based Image Authentication: Current Status, Issues, and Challenges[C]. in: Proceedings of the/ntemational Conference on Semantic Computing (ICSC) 2007, Califomia, Sep 2007:630 - 636.
  • 10吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70

二级参考文献65

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部