期刊文献+

基于文本特征的水印算法设计及关键技术研究 被引量:1

Characteristics of the Text Watermarking Algorithm Based on the Design and Key Technology Research
下载PDF
导出
摘要 根据字符(串)信息在数字水印加载和检测当中鲁棒性适应较好的这一特性,利用载体字符计算出一系列伪随机代码,进而产生能够及时纠正错误的可适应性文本数字水印。分析表明,通过这一设计的实验产生的伪随机代码在随机性上较为灵活,仿真实验数据也进一步印证了改变字符或字符串的拓扑结构保持水印扩频技术的优势,并较好地提高了抗攻击性能。 According to the character (string) robust digital watermarking information in loading and detection of adapt to the cha-racteristics of good character, the calculation of a series of pseudo random code, which can correct the adaptability of text digital watermarking error. Analysis shows that, pseudo random code generated by the design of the experiment is very flexible in random, experimental data and further verify the watermark spread spectrum technology change of topology character or string to keep ad- vantage, and improves the anti-attack capability.
作者 陈翔
机构地区 Research Department
出处 《微型电脑应用》 2013年第9期62-64,共3页 Microcomputer Applications
基金 湖南省教育厅基金项目 长沙师范学院基金项目(XXYB201109)
关键词 文本数字水印 字符拓扑结构 内容 嵌入 Text Digital Watermarking Character Topology Content Embedding.
  • 相关文献

参考文献6

二级参考文献59

  • 1赵东宁,张勇,李德毅.基于云模型的文本数字水印技术[J].计算机应用,2003,23(z2):100-102. 被引量:19
  • 2侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 3吴健珍,谢剑英.基于模糊聚类和HVS的DWT自适应盲水印算法研究[J].计算机工程与应用,2004,40(17):109-111. 被引量:4
  • 4戴祖旭,洪帆,崔国华,付敏.基于词性标记串统计特性的文本数字水印算法[J].通信学报,2007,28(4):108-113. 被引量:11
  • 5Katzenbeisser, S. C. Principles of Steganogtaphy. In: S. Katzenbeisser and F. A. P. Petitcolas(eds. ) ,Information Hiding[ C ]. Techniques for Steganography and Digital Watermarking. Boston: Artech, 2000,17- 41.
  • 6Brassil, J., N. F. Maxemchuk, and L. O' Gonnan. Electronic Marking and Identification Technique to Discourage Document Copying[C] .Proceedings of INFOCOM '94,1994,1278- 1287.
  • 7Maxemchuk, N. F. 1994. Electronic Document Distribution[ J ]. AT&T Technical Journal, September/October, 73 - 80.
  • 8Low, S. H., N. F. Maxemchuk, and A. M. Lapnoe. Document Identification for Copyright Protection Using Centroid Detection[J]. IEEE Transactions on Communication, 1998,46(3) ,372 - 383.
  • 9Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg. Natural Language Processing for Information Assurance and Security:An Overview and Implementations [ C ]. In: M. Shaeffer ( ed. ), NSPW' 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51 - 65.
  • 10Mikhail J., Atallah, Samuel S., Wagstaff, Jr.. Watermarking with Quadratic Residues[C]. Working Paper,Department of Computer Science, Purdue University, 1996.

共引文献118

同被引文献6

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部