期刊文献+

基于数字水印的提花织物品牌认证方法 被引量:1

The Jacquard Brand Authentication Method for Jacquard Based on Digital Watermark
下载PDF
导出
摘要 针对提花织物防伪问题,在分析提花织物生产工艺的基础上,提出了一种用于真伪认证的基于小样图的易损盲水印算法。该算法首先设计了最小的水印编码方案,解决了张力平衡问题,并考虑了裁剪对水印的影响。经实际生产验证,该算法生成的水印对织物外观无可察觉影响,并能进行有效认证。采用该方法后将极大地增加假冒的难度和成本,是一种保护提花织物品牌的有效技术手段,也是数字水印技术在非数字媒质织物上应用的创新尝试。 In order to provide the anti-counterfeiting for brand authentication,a fragile watermark algorithm is designed and implemented based on the analysis of the process of cloth manufacturing. In this algorithm, a shortest watermark coding scheme is designed to maintain the temsility balance considering the watermark damage caused by cutting. Experiments show that watermark has no noticeable effect to the appearance, and it is useful for authentieation. The method is an effective technical means to authenticate for jacquard brand which greatly increases the cost and difficulties to forge products. It is also an innovation of watermarking technique which can be used in non-digital media texture.
出处 《中国图象图形学报》 CSCD 北大核心 2009年第12期2470-2477,共8页 Journal of Image and Graphics
基金 国家自然科学基金重点项目(60533080) 浙江省白然科学基金项目(Y1090515) 浙江省科技厅重点招标项目(2004011028)
关键词 提花织物 数字水印 易损水印 认证 jacquard, digital watermark, fragile watermark, authentication
  • 相关文献

参考文献5

二级参考文献90

  • 1金聪,彭嘉雄.基于图像投影序列的盲数字水印鲁棒检测方法[J].软件学报,2005,16(2):295-302. 被引量:11
  • 2孔繁荣,朱学骏,周骏马,张耕耘,陈受宜.北京地区性病高危人群泌尿生殖道沙眼衣原体感染调查[J].中华皮肤科杂志,1994,27(3):156-157. 被引量:15
  • 3孙中伟,冯登国.DCT变换域乘嵌入图像水印的检测算法[J].软件学报,2005,16(10):1798-1804. 被引量:15
  • 4李长玲 吕建进 等.83077例性传播疾病分析[J].皮肤性病学杂志,1997,3:12-14.
  • 5Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 6Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 7Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 8Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 9Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 10Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004

共引文献229

同被引文献8

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2NAOR M, SHAMIR A. Visual cryptography[ C]//Lecture Notes in Computer Science, Advances in Cryptology EUROCRYPT' 94. 1995 : 1-12.
  • 3XIA Guang-sheng, YANG Yi-xian. A new technology for key sharing [ J]. Journal of Beijing University of Posts and Telecommunica- tions, 1993,22( 1) :57-61.
  • 4CHIN M H, WEN G T. Cheating prevention in visual cryptography [ J ]. I EEE Trans on Image Processing ,2007,16 ( 1 ) :36-45.
  • 5GENU-MDAL P, EUN-JUN Y. A new copyright protection scheme with visual cryptography[ C ]//Proc of the 2rid International Confe- rence on Future Generation Communication and Networking Sympo- sium. 2008:60-63.
  • 6JENA D, JENA S K. A novel visual cryptography scheme [ C ]//Proc of Intemational Cotrferenace on Advanced Computer Control. 2009: 207-211.
  • 7柳毅,郝彦军,庞辽军.基于ElGamal密码体制的可验证秘密共享方案[J].计算机科学,2010,37(8):80-82. 被引量:9
  • 8张海燕,李元媛,储晨昀.基于图像分块的多尺度Harris角点检测方法[J].计算机应用,2011,31(2):356-357. 被引量:22

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部