期刊文献+

基于数字水印的电子文档信息标识应用方案 被引量:1

Application scheme of identity e-documents based on digital watermarking
下载PDF
导出
摘要 采用层次划分的技术设计了一个具有普适特征的水印技术应用框架,适用于实现电子文档的信息标识,同时也适用于在信息系统中应用数字水印技术实现其他应用。框架分为驱动层、适配层和应用层。在此基础上提出了一种基于分层水印技术应用框架的电子政务网络中电子文档信息标识方案,实现了数字水印作为信息标识的嵌入和检测。 A generally suitable framework for watermarking application was proposed based on hierarchy,which was not only suitable for e-documents identity but also suitable for other kinds of digital watermarking applications.It was composed of three layers: driver layer,adapter layer and application layer.Then based on the techniques of layered watermarking,a scheme of e-documents identity was proposed based on digital watermarking technique.Also,the identity formats of confidential e-documents and the way to use it were discussed.
出处 《计算机应用》 CSCD 北大核心 2010年第7期1818-1820,1824,共4页 journal of Computer Applications
关键词 电子文档 信息标识 数字水印 数字指纹 信息保护 e-document information identity digital watermarking digital fingerprint information protection
  • 相关文献

参考文献7

  • 1HUNT R.PKI and digital certification infrastructure[C] // Proceedings of 9th IEEE International Conference on Networks.New York:IEEE,2001:234-239.
  • 2BANSAL A,BHADOURIA S.Network security and confidentiality with digital watermarking[C] // Proceedings of 2007 Digital EcoSystems and Technologies Conference.Inaugural:IEEE-IES,2007:325-328.
  • 3VOLOSHYNOVSKIY S,DEGUILLAUME F,PUN T.Content adaptive watermarking based on a stochastic multiresolution image modeling[C] // Proceedings of 10th European Signal Processing Conference.Tampere:TTKK-Paino,2000:138-144.
  • 4朱大立,陈晓苏.基于Agent技术的数字水印协议框架[J].计算机工程与设计,2007,28(11):2693-2695. 被引量:4
  • 5朱大立,陈晓苏.基于数字水印技术的电子政务安全模型[J].计算机应用,2005,25(B12):80-81. 被引量:12
  • 6王彦,孙鹏,吕述望.一种企业机密文档分发机制[J].计算机工程,2004,30(22):27-29. 被引量:6
  • 7CHEUNG S C,CUREEM H,CHIU D K W.A watermarking infrastructure for enterprise document management[C] // Proceedings of the 36th Hawaii International Conference of System Science.Washington,DC:IEEE Computer Society,2003:1183-1190.

二级参考文献23

  • 1吴立军,苏开乐.基于角色PMI的电子政务安全模型[J].计算机工程与应用,2004,40(31):117-119. 被引量:6
  • 2王彦,孙鹏,吕述望.一种企业机密文档分发机制[J].计算机工程,2004,30(22):27-29. 被引量:6
  • 3Cheung S C,Chiu D K W.A Watermarking Infrastructure for Enterprise Document Management. Proceedings of the 36th Hawaii International Conference on System Sciences, CD-ROM / Abstracts Proceedings,ISBN 0-7695-1874-5 - Track 4, 2003
  • 4Griswold G N. A Method for Protecting Copyright on Networks. Joint Harvard MIT Workshop on Technology Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, 1993-04
  • 5Low S H, Maxemchuk N F, Lapone A. Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communications, 1998, 46(3): 372-383
  • 6Memon N, Wong P. A Buyer-Seller Watermarking Protocol. IEEE Transactions on Image Processing, 2001, 10(4):643-649
  • 7Popek G J, Kline C S. Encryption and Secure Computer Networks.ACM Computing Surveys, 1979, 11 (4): 331-356
  • 8Pfitzmann B, Schunter M. Asymmetric Fingerprinting.Ueli M. Maurer (Ed.), Advances in Cryptology, EUROCRYPT96,1996:84-95
  • 9Shivakumar N, Molina H G. SCAM: A Copy Detection Mechanism for Digital Documents. In Proc. of 2nd International Conference in Theory and Practice of Digital Libraries, 1995-06
  • 10Si A, Leong H V, Lau R W H.Check:A Document Plagiarism Detection System,Proc.of ACM Symposium for Applied Computing, 1997-02:70-77

共引文献17

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部