期刊文献+

利用生物特征水印的交易协议及其实现

Exchange Protocol and Implementation of Using Biometric Watermark
下载PDF
导出
摘要 为解决水印密钥保密传递和唯一性等问题,将生物识别技术与数字水印相结合,从应用角度分析了现有的数字水印协议和模型,引入生物特征识别技术,给出了一种安全的数字水印协议;实现了一种基于指纹识别的生物特征水印实施方案,解决了一般情况下生物特征数据和数据量较大、难于将其表达成能适应水印嵌入和提取的关键问题。实验证明,该方案是可行和有效的。 To deal with watermark key secure transfer and uniqueness, the feasibility of combining biometric identification technology and digital watermark are studied, the existing watermarking protocol and model, the biometric identification technology in the protocol is introduced, and a secure digital watermarking protocol is proposed. Scheme of biometrics watermark based on fingerprint identification has been implemented to solve key problems for data volume of biometrics which is too large to embed and extract watermarking in general case. The experiment showed that the scheme is effective and feasible.
出处 《吉林大学学报(信息科学版)》 CAS 2010年第3期303-308,共6页 Journal of Jilin University(Information Science Edition)
关键词 信息安全 生物特征水印 协议 指纹识别 information security biometrics watermark protocol fingerprint identification
  • 相关文献

参考文献11

  • 1ANIL K, JAIN, UMUT ULUDAG. Hiding Biometric Data [ J ]. IEEE Transaction on Pattern Analysis and Machine Intellgence, 2003, 25 (11): 1494-1498.
  • 2SUNG SHIK KOH, CHUNG HWA-KIM. Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking [ C ] //AIS2004. Betlin: Springer, 2004 : 498-507.
  • 3YANG SUN-lEE, HEAU-JO KANG, YOON HO KIM. Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme [ C ] //Knowledge-Based Intellient Information and engineering Systems. Betlin: Springer, 2005: 567-572.
  • 4QIAO L, NAHRSTEDT K. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights [J]. Journal of Visual Communication Image Represent, 1998, 9 (3) : 194-210.
  • 5DANIEL AUGOT, JEAN-MARC, JEAN-FRANCOIS. Secure Delivery of Image over Open Networks [ J]. IEEE, 1999, 87 (7) : 1251-1266.
  • 6MEMON N, WONG P W. A Buyer-Seller Watermarking Protocol [J]. IEEE Transations on Image Processing, 2001,110(4) : 643-649.
  • 7CHANG C C, CHUNG C Y. An Enhanced Buyer-Seller Watermarking Protocol [ C] //IEEE Proceedings of ICCT. Beijing, China: Institute of Electrical and Electronics Engineers Ine, 2003: 1779-1783.
  • 8DAVIDSALOMON.数据压缩原理与应用[M].北京:电子工业出版社,2003.6-35.
  • 9Mark Nelson.数据压缩技术原理与范例[M].贾起东译.北京:科学出版社,1995.
  • 10COX I J, KILIAN J. Secure Spread Spectrum Watermarking for Images, Audio and Video [ C] //Proceedings of IEEE International Conference on Image Processing. Lausanne, Switz: IEEE, 1996: 243-246.

二级参考文献4

  • 1[1]I.J.Cox, M.L.Miller, J.A.Bloom. Watermarking applications and their properties. Published in the Int. Conf. on Information Technology 2000. Lasvegas:2000.
  • 2[2]F. Hartung, B. Girod. Watermarking of MPEG-2 encoded video without decoding and re-encoding Multimedia Computing and Networking 1997. published as SPIE 3020, 1997. 264~273.
  • 3[3]K. Matsui, K. Tanaka. Video-stegano graphy:How to Secretly Embed a Signature in a Picture. Journal of the Interactive Multimedia Associcationm Intellectual Property Project, 1994, 1(1):187~206.
  • 4[4]M.S.Kankanhalli, Rajmohan, Ramakrishnan. Content Based Watermarking of Images. ACM Multimedia'98.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部