期刊文献+

安全数字水印体系的研究 被引量:5

THE RESEARCH OF SECURE DIGITAL WATERMARKING ARCHITECTURE
下载PDF
导出
摘要 数字水印是用于保护网络多媒体产品版权的一门热门新兴技术。随着对数字水印技术研究的深入,水印技术日趋成熟。但是算法的改进和优化仍然很难抵御五花八门的攻击方法,因此必须建立一套安全的数字水印体系标准来规范水印的加载和检测。该文基于IPR保护和认证体系IMPRIMATUR和AQUARELLE商业模型,提出了一个新的安全数字水印体系,该体系弥补了IMPRIMATUR和AQUARELLE所采用的DHWM水印协议的缺陷,而且更加简洁实用。 Watermarking, as a new technique mainly used for IPR protection and authentication, has become a research hotspot not long after its appearance. Many effective watermarking algorithms have been proposed. But the mature of watermark technology is not enough for IPR, protection. Confronted with current various attack method, a secure watermarking architecture must be built to standardize the whole process,, from watermark insertion to detection. The AQUARELLE system is a good example for showing how IMPRIMATUR-an architecture for IPR protection is operated. The secure flaws of IMPRIMATUR and AQUARELLE system watermarking protocol will also be pointed out. Further, a new secure watermarking architecture will be proposed. Its effectiveness will make up for the flaws mentioned above.
出处 《电子与信息学报》 EI CSCD 北大核心 2001年第9期833-840,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(批准号 60073049 69882002) 国家重点基础研究发展规划项目(批准号 G1999035805) 模式识别国家重点实验室资助项目 高等学校骨干教师资助计划项目
关键词 知识产权保护 数字水印 水印攻击 水印协议 保密通信 Intellectual property right protection, Digital watermarking, Watermarking at- tack, Watermarking protocol, Secure digital watermarking architecture
  • 相关文献

参考文献9

  • 1[1]E. Koch, J. Zhao, Towards robust and hidden image copyright labeling, Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Halkidiki, Greece, June 20-22, 1995, 452-455.
  • 2[2]I.J. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum waterm arking for images audio and video, IEEE Proc. Int. Conf. Image Processing(ICIP'96), Lausanne, Switzerland.Vol. III, 1996, 243 246.
  • 3[3]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, 6(12), 1673 1687.
  • 4[4]L.F. Turner L F, Digital data security system, Patent IPN WO89/08915, 1989.
  • 5[5]R.G. Schyndel, A. T. Tirkel, C. F. Osborne, A digital watermark, Int. Conf. on Image Processing,Vol.2, 1994, 86 90.
  • 6[6]Scott Craver, Nasir Memon, Boon-Lock Yeo, Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications, IEEE J. on Selected Areas in Communications, 1998, 16(4), 573 586.
  • 7[7]Daniel Augot, Jean-Marc. Jean-Francois, Secure delivery of image over open networks, Proc.IEEE, 1999, 87(7), 1251-1266.
  • 8[8]Keith Hill, A Perspective: The role of identifiers in managing and protecting intellectual property in the digital age, Proc. IEEE, 1999, 87(7), 1228 1238.
  • 9[9]W. Diffie, M. W. Hellmann, New directions in cryptography, IEEE Trans. on Info. Theory, 1976,IT-22(5), 644-645.

同被引文献26

引证文献5

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部