期刊文献+

多媒体认证技术的回顾与展望 被引量:2

The Survey of Multimedia Content Authentication Techniques
下载PDF
导出
摘要 由于数字制品易修改的特性降低了自身的可信度,因此有必要验证数字媒体的真实性 与完整性。多媒体认证技术在这一领域得到了广泛地应用。综述了多媒体认证技术的分 类、基本框架和基本要求,介绍了目前文献提出的认证算法,并提出认证系统可能遭受的攻 击及相应对策,最后展望了多媒体认证技术的发展前景。 In recent years, multimedia authentication techniques have been widely used in the completeness authentication and content authentication of digital m edia. The paper summarizes the categories of authentication techniques and prese nts the general frameworks and features for authentication systems, introduces v arious existing algorithms, and discusses the attacks and their counter measures , finally forecasts the development foreground of the multimedia authentication techniques.
作者 刘彤 裘正定
出处 《计算机应用研究》 CSCD 北大核心 2002年第5期49-52,共4页 Application Research of Computers
关键词 多媒体 认证技术 数字签名 信息安全 计算机网络 Authentication Digital Signature Digital Watermarking In formation Security
  • 相关文献

参考文献15

  • 1[1]C-Y Lin,et al. A Robust Image Authentication Method Surviving JPEG Lossy Compression [A]. SPIE Storage and Retrieval of Image/Video Databases, San Jose,1998.
  • 2[2]Lie-hua Xie. Authentication Codes and Watermarking for Multimedia Communications in Lossy Networks [D]. Ph D thesis , University of Delaware,2000.
  • 3[3]S Walton. Image Authentication for a Slippery New Age [J]. Dr. Dobb's Journal,1995,20(4):18-26.
  • 4[4]M Schneider,et al. A Robust Content Based Digital Signature for Image Authentication [J]. in Proc. IEEE Int.Conference on Image Processing, Lausanne, Switzerland,1996,(9).
  • 5[5]S Bhattacharjee,M Kutter. Compression Tolerant Image Authentication [J]. in Proc. IEEE Int. Conf. in Image Processing,1998,1(10).
  • 6[6]D Kundur,D Hatzinakos. Towards a Telltale Watermarking Te-chnique for Tamper-proofing [J]. In Proc. IEEE Int. Conf. on Image Processing, 1998.
  • 7[7]D Kundur,D Hatzinakos. Digital Watermarking for Telltale Ta-mper Proofing and Authentication [J]. Proc. of IEEE,1999,87(7):1167-1180.
  • 8[8]G J Yu, C S Lu, H Y Mark Liao,et al. Mean Quantization Blind Watermarking for Image Authentication[J]. Proc. IEEE Int. Conf. on Image Processing , Vancouver, Canada,2000,Ⅲ:706-709.
  • 9[9]K Ohta,M Matsui. Differential Attack on Message Authentication Codes [A]. Advances in Cryptology-Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, Springer Verlag, D Stinson, et al., 1994.
  • 10[10]R B Wolfgang,E J Delp. A Watermark for Digital Images [J]. Proc. IEEE Int. Conf. on Image Processing,1996,3:219-222.

同被引文献27

  • 1[1]Bin B.Zhu,Mitchell D.Swanson,Ahmed H.Tewfik.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,3:40-49.
  • 2[3]R.B.Wolfgang,E.J.Delp.A watermark for digital images[J].Proc.IEEE Int.Conf.on Image Processing,1996,3:219-222.
  • 3[4]Lie Wen-Nung,Chang Li-Chun.Data hiding in images with adaptive numbers of least significant bits based on the human visual system[J].Proc.IEEE Int.Conf.Images Processing,1999,1:286-290.
  • 4[6]M.Ramkumar,A.N.Akansu,A.A.Alatan.A Robust Data Hiding Scheme for Images Using DFT[J].Proc.IEEE Int.Conf.Images Processing,1999,2:211-215.
  • 5[7]V.Solachidis,N.Nikolaidis,I.Pitas.Watermarking Polygonal Lines Using Fourier Descriptors[J].Proc.IEEE Int.Conf.On Acoustics,Speech,and Signal Processing,Istanbul,Turkey,June 2000:1955-1958.
  • 6[8]H.Inoue,A.Miyazaki,and T.Katsura.An Image Watermarking Method Based on the Wavelet Transform.[J].Proc.IEEE Int.Conf.Images Processing,1999,1:296-300.
  • 7[9]V.Gorodetsky,V.Samoilov.Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel[A].In:Computer Network Security,Lecture Notes in Computer Science,2776[C],Springer-Verlag,2003,349-359.
  • 8[10]S.Stankovic,I.Djurovic,I.Pitas.Watermarking in the Space/Spatial-Frequency Domain Using TwoDimensional Radon-Wigner Distribution[J].IEEE Trans.on Image Processing,2001,10:650-658.
  • 9[12]Dittmann J,Steinmetz A,Steinmetz R.Content-based digital signature formotion pictures authentication and content-fragile watermarking[A].In:1999 IEEE International Conference on Multimedia Computing and Systems[C].Florence,Italy,1999,2(2):209-213.
  • 10[13]Schneider M,Chang S F.A robust content-based digital signature for image authentication[A].In:Proc ICIP-96[C].Lausanne,Switzerland,1996,3(9):227-230.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部