期刊文献+

数字水印的攻击方法 被引量:18

THE ATTACK METHODS OF DIGITAL WATERMARKING
下载PDF
导出
摘要 数字水印是近两年来出现的数字产品版权保护技术,目的是保护数字产品的合法拷贝和传播,是当前国际学术界的研究热点。数字水印包括算法设计和攻击技术两方面,它们是互相促进的对立面。本文简单讨论了数字水印的概念和应用,全面分析总结了当前数字水印的各种攻击方法,提出了数字水印下一步的发展方向,对改进和设计水印算法具有重要的指导作用。 Digital watermarking is a technique, which protects digital product copyright and does not appear until two years ago. And its goal is to protect legal copy and distribution of digital product, it has been the hotspot of international academia. Digital watermarking includes algorithm design and attack technique, which are contrarily promoting each other. In this paper the concept and applications of digital watermarking are briefly discussed, the current various attack methods are fully analyzed and summarized. Several directions of development of digital watermarking at next stage are proposed. These are of great importance to improve and design watermarking algorithm.
出处 《电子与信息学报》 EI CSCD 北大核心 2001年第7期705-711,共7页 Journal of Electronics & Information Technology
基金 国家重点基础研究发展规划项目(G1999035805) 国家杰出青年基金(69425001) 国家自然科学基金(60073049) 高等学校骨干教师资助计划的资助
关键词 知识产权保护 数字水印 密码学 因特网 计算机网络 Intellectual property right protection, Digital watermarking, Watermarking at-tack
  • 相关文献

参考文献9

  • 1[1]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.
  • 2[2]N. Memon, P. W. Wong, Protecting digital media content, Communications of the ACM, 1998, 41(7), 35-43.
  • 3[3]S. Crave, B. L. Yeo, M. Yeung, Technical trials and legal tribulations, Conmmnieations of theACM, 1998, 41(7), 45-54.
  • 4[4]G.C. Langelaar, R. L. Lagendijk, J. Biemond, Renoving spatial spread spectrum watermarks bynon-linear filtering, EUSIPCO'98, 1998, 2281-2284.
  • 5[5]I.J. Cox, J. M. G. Linnartz, Some general methods for tampering with waternarks, IEEE J. onSelected Areas in Communications, 1998, SAC-16(4), 587 593.
  • 6[6]http://wwvw.cl.cam.ac.uk/users/fapp2/.
  • 7[7]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? Proceedings of IS&T/SPIE Electronic Imaging-Storage and Retrieval of Image and VideoDatabases, San Jose. S, CA: SPIE, Feb. 13-14, 1997, 310-321.
  • 8[8]S. Craver, N. Memon, B. L. Yeo, M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of the IEEE International Conf. on Image Processing, Santa Barbata, CA,IEEE Press, 1997, 540-543.
  • 9[9]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Resolving rightful ownerships with invisible wa-termarking techniques: limitations, attacks, and implications, IEEE J. on Selected Areas inComnunications, 1998, SAC-16(4), 573-586.

同被引文献98

引证文献18

二级引证文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部