期刊文献+

同时实现版权保护与内容认证的半易损水印方案 被引量:4

Semi-Fragile Watermarking for Image Copyright Protection and Content Authentication
下载PDF
导出
摘要 提出一种基于量化的半易损水印方案 ,能够在不参考原图的情况下对数字图像同时进行版权保护和内容真实性认证 .本文算法一方面具有较好的鲁棒性 ,能够在水印图像遭受攻击以后仍然检测到图像的版权 ,另一方面具有较好的敏感性 ,既允许对水印图像进行一般性处理 ,又能检测并反映出水印图像被篡改的区域 . In this paper, we propose a quantization based semi fragile watermarking algorithm for copyright protection and content authentication simultaneously. The watermark can be blindly extracted for different applications in the detection process. Our scheme is robust to incidental manipulations while fragile to malicious distortions. The tampered area of a watermarked image can be reflected in the watermarking difference map. Experimental results show that the proposed semi fragile watermarking is effective for copyright protection and content authentication.
作者 刘彤 裘正定
出处 《北方交通大学学报》 CSCD 北大核心 2002年第1期6-10,共5页 Journal of Northern Jiaotong University
关键词 版权保护 内容认证 半易损水印 易损性 鲁捧性 数字图像 semi fragile watermarking copyright protection content authentication fragility robustness
  • 相关文献

参考文献10

  • 1[1]Lin E T, Delp E J. A Review of Fragile Image Watermarks[A]. ACM Multimedia '99[C]. Orlando,1999.25-29.
  • 2[2]Fridrich J. Methods for Detecting Changes In Digital Images[A], Proc. of The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98)[C]. Australia: Melbourne, 1998.
  • 3[3]Lin E T, Podilchuk C I, Delp E J. Detection of Image Alterations Using Semi_fragile Watermarks[A]. Proc. of SPIE Int. Conf. on Security and Watermarking of Multimedia Contents[C]. CA: San Jose, 2000. 3971.
  • 4[4]Wolfgang R B, Delp E J. A Watermark for Digital Images[J]. Proc. IEEE on Image Processing, 1996, 3: 219-222.
  • 5[5]Yu G J, Lu C S, Sheu J P, et al. Mean Quantization Blind Watermarking for Image Authentication[A]. Proc. IEEE Int. Conf. on Image Processing(Vol III)[C]. Canada: Vancouver, 2000.706-709.
  • 6[6]Kundur D, Hatzinakos D. Digital Watermarking for Telltale Tamper Proofing and Authentication[J]. Proc. of IEEE On Image Processing, 1999, 87: 1167-1180.
  • 7[7]Hartung F, Su J K, Girod B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks[A]. Security and Watermarking of Multimedia Contents Proc. [C].SPIE 3657, 1999.
  • 8[8]Craver S, Memon N, B-L Yeo, et al. Can Invisible Watermarking Resolve Rightful Ownerships[J]. IS&T/SPIE Electronic Imaging, 1998,3022: 310-321.
  • 9[9]Watson A B, Yang G Y, Solomon J A. Visibility of Wavelet Quantization Noise[J]. Proc. of IEEE Trans. On Image Processing, 1997, (6): 1164-1175.
  • 10[10]Lin C Y, Chang S F. A Robust Image Authentication Method Surviving JPEG Lossy Compression[A]. SPIE Storage and Retrieval of Image/Video Databases[C]. CA:San Jose, 1998.

同被引文献19

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部