期刊文献+

基于DCT的数字水印鲁棒性研究 被引量:4

Research on the Digital Watermark Robustness Based on DCT
下载PDF
导出
摘要 数字水印是近几年来出现的数字产品版权保护技术,是当前国际学术界的研究热点。本文对数字水印进行了简要地概述,详细介绍了DCT的基本原理,采用Matlab7.0进行相关仿真实验,论述了基于DCT的数字水印的鲁棒性。 The Digital Watermark is a preservation technology about the digital product copyright which appeared in the last few years, and it's the current international academic circle's research focus. The article provides an overview of the digital watermark, introduces the DCT basic principle in detail, uses Matlab7.0 to carry on the related simulation experiment, and discusses the DCT-based digital watermark robustness.
作者 杨森 吕国英
出处 《办公自动化(综合月刊)》 2010年第2期28-29,共2页 Office Informatization
关键词 数字水印 DCT 鲁棒性 Digital watermark DCT Robustness
  • 相关文献

参考文献3

二级参考文献15

  • 1F Hartung, J K Su, and B Girod. Spread spectrum watermarking:Malicious attacks and counterattacks[C]. in Proc.SPIE Security and watermarking of Multimedia Contents 99,San Jose, CA, Jan.1999.
  • 2J R Hernández, F Pérez-González and J M Rodríguez. The impact of channel coding on the profermance of spatial watermarking for copyright protection[C]. in Proc.IEEE ICASSP 98, Seattle, WA, May 1998.
  • 3M Kutter. Watermarking resisting to translation, rotation, and scaling[C]. in Proc.SPIE Int .Symp. on voice, video, and Data Communication, Nov.1998.
  • 4M Kutter, F Jordan. Digital signature of color images using amplitude modulation[J]. J.Electron.Imaging, Apr.1998, (7).
  • 5S Craver, N menon. On the invertibility of invisible watermarking techniques[C]. in Proc.IEEE ICIP'97, 1 :540-543.
  • 6G Nicchiotti and E Ottaviani. Non-invertible statistical wavelet watermarking[C]. Proc.Europ.Signal Processing Conf. Rhodes,Greece, Sept.1998.
  • 7L Qiao and K Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customer's rights[J]. J.Visual Commun. Image Representation, Sept 1998, 9:194-210.
  • 8I Cox, J Kilian. Secure spread spectrum watermarking for images, audio and video[R]. NEC Res.Inst.Princeton,NJ Tech.Rep.95-10,1995.
  • 9H S Stone. Analysis of attacks on image watermarks with randomized coefficients[R]. NEC Res.Inst.Princeton.NJ,Tech.Rep., May 1996.
  • 10I Cox, J Kilian. Collusion-secure fingerprinting for digital data[J]. IEEE Trans.Inform.Theory, Sept 1998, 44.

共引文献302

同被引文献21

  • 1赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950. 被引量:46
  • 2徐先传,张琦.一种基于DCT域的数字水印方案研究[J].微计算机信息,2007,23(04X):59-61. 被引量:9
  • 3Cox I J, Kilian J, Leighton T, et al. A Secure Robust Watermark for Multimedia[C]//Proc. of Workshop on Information Hiding. Cambridge, UK: Spring-Verlag, 1996: 185-206.
  • 4Tirkel A.Electronic watermark[C]∥Macquarie University,Digital Image Computing Technology and Applications,Sidney,1993:666-673.
  • 5Bansal E,Bhadauria S.Watermarking using neural network and hiding the trained network within the cover image[J].Journal of Theoretical and Applied Information Technology,2008,4:663-670.
  • 6Bani M,Younes,Jantan A.Image encryption using blockbased transformation algorithm[J].International Journal of Computer Science,2008,35(1):15-23.
  • 7Chang C,Lin C,Tseng C,et al.Reversible hiding in DCTbased compressed images[J].Information Sciences,2007,177:2768-2786.
  • 8Chang C,Chen T,Chung L.A steganographic method based upon JPEG and quantization table modification[J].Information Sciences,2002,141:123-138.
  • 9Iwata M,Miyake K,Shiozaki A.Digital steganography utilizing features of JPEG images[J].IEICE Transactions on Fundamentals,2004,87:929-936.
  • 10郭宏,郝俊杰.一种基于DCT的鲁棒性数字水印算法[J].现代计算机,2007,13(12):46-49. 被引量:4

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部