期刊文献+

数字水印、密码学比较研究 被引量:17

Comparative Research on Watermarking and Cryptology
下载PDF
导出
摘要 该文将数字水印和密码学进行比较,通过对二者的比较指出密码学在数字水印技术发展过程中所起的重要作用及影响;该文所作的工作对于深刻地理解二者之间的关系、更好地把密码学中的一些成熟技术和方法应用到数字水印技术研究中,具有重要的理论和现实意义。 This paper compares digital watermarking and cryptology,and emphasizes that cryptology has important influence on and contribution to the history of digital watermarking.This paper can help us deeply understanding the relationship between these two techniques,and can help us to introduce the methods and techniques of cryptology into digital watermarking better.It has theoretical and practical meaning.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第9期63-67,共5页 Computer Engineering and Applications
基金 国家自然科学基金重点资助项目(编号:90104005) 国家自然科学基金资助项目(编号:66973034)
关键词 版权保护 数字水印 密码学 比较研究 copyright protection,digital watermarking,cryptography,comparative research
  • 相关文献

参考文献21

  • 1[1]Bruce Schneier. Applied Cryptography-Protocols,algorithms,and source code in C[M].Second Edition,John Wiley & Sons,Inc,1996
  • 2[2]A P Fabien,J Ross,G Kuhn Markus. Information Hiding-A Survey[J].Proceedings of the IEEE ,special issue on protection of multimedia content, 1999; 87 ( 7 ): 1062~1087
  • 3[3]http://www.watermarkingworld.org
  • 4[4]I J Cox,J Kilian,T Leighton et al. Secure Spread Spectrum Watermarking for Multimedia[M].NEC Research Institute,Princeton,NJ,USA,TR-1995-10
  • 5[5]I J Cox,M L Miller,A L Mckellips. Watermarking as communications with side information[J].Proccedings of the IEEE, 1999 ;87:1127~1141
  • 6[6]B Natarajan. Robust Public Key Watermarking of Digital Images[M].Computer Systems Laboratory,HP Labs, 1997
  • 7[7]P W Wong. Image Security and Watermarking[M].Imaging Tech Dept,HP Labs, 1996
  • 8[8]P W Wong. A Public watermark for image verification and autentication[C].In :Proceedings of the Internaltional Conference on Image Processing, Chicago, Illinois, 1998
  • 9[9]A Menezes,P van Oorschot,S Vanstone. Handbook of Applied Cryptography[M].CRC Press, 1996
  • 10[10]S Craver. Zero Knowledge Watermark Detection[C].In:Proceedings of the Third International Workshop on Information Hiding,Springer Lecture Notes in Computer Science , 2000 :101~116

同被引文献75

引证文献17

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部