期刊文献+

二维条码数字水印技术研究 被引量:7

Research of Two Dimension Bar Code and Digital Watermarking Technology
下载PDF
导出
摘要 二维条码技术凭其自身的高容量、高密度、高纠错能力等优点,已被广泛应用于各行各业,因此二维码技术在安全防伪方面的应用以及研究也日益重要。数字水印技术是信息隐藏技术的一个重要分支,其对数字内容的版权保护有重要实用价值和实践意义。文章首先简单介绍了二维条码技术的基本概念、特征、应用现状等。然后总结概述了近几年来二维码技术和数字水印技术结合的一些研究成果,分析和讨论了部分典型算法,并指出了二维条码水印技术今后可能的一些发展方向。 As the two dimension bar code's much advantages, such as big capacity, high density and great error correcting ability, the two dimension bar code technology is widely used in different walks of our life increasingly. Simultaneously, the research of two dimension bar code technology in anti-counterfeiting and security field application is increasingly indispensable. And the digital watermarking technology which is an important branch of information hiding technology, has significantly practical value to the digital copyright protection. Firstly, this study introduces the two dimension bar code technology's concept, characteristics and its application status simply. Then summarizes and analysis the recent research achievements of the combination of two dimension bar code and digital watermarking technology. Finally this paper points out some could be research development directions of the combination of two dimension bar code technology and digital watermarking technology.
作者 刘丽 周亚建
出处 《信息网络安全》 2014年第1期56-60,共5页 Netinfo Security
基金 国家自然科学基金[61003284] 新闻出版重大科技工程[GXTC-CZ-1015004/09] 北京市自然科学基金[4122053] 北京市教育委员会科技计划面上项目[KM201210015006]
关键词 二维条码 信息隐藏 数字水印 2D bar code information hiding digital watermarking
  • 相关文献

参考文献22

二级参考文献91

共引文献140

同被引文献76

  • 1林崧,刘晓芬,姚志强.一种基于汉明码的数字水印算法[J].福建师范大学学报(自然科学版),2004,20(4):24-27. 被引量:5
  • 2张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 3MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 4ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 5KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 6PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 7NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 8XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between Guest OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 9WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 10Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部