期刊文献+

图像水印系统有效性的评价框架 被引量:16

Evaluation of the Validity of Image Watermarking
下载PDF
导出
摘要 介绍了信息隐藏分析技术的研究进展 ,在对典型的图像水印基准测试工具软件StirMark ,Checkmark和Optimark的功能进行比较的基础上 ,讨论了水印系统的安全性 ;提出一种水印系统满足有效性的评价框架 ,并给出了一个基本的必要条件 ;进而讨论了水印系统的鲁棒性、嵌入量和质量之间的变换关系 ;对隐藏分析和主动攻击给水印嵌入技术带来的公开问题以及水印嵌入系统可能出现的研究热点也给予了讨论 . This paper introduces the research methods of Steganalysis of Watermark techniques. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, authors discuss the security of watermark system, present an evaluation that satisfies the validity, and give a basic necessary condition to judge the validity of image watermarking. Authors also discuss the restrictive relations of robustness, payload and quality in watermark system. The public problems in watermark embedding techniques, which arc brought by steganalysis and active attack, and the future directions in watermark embedding system are also discussed.
出处 《计算机学报》 EI CSCD 北大核心 2003年第7期779-788,共10页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目 (G19980 3 0 42 0 G19980 3 0 60 2 G19980 3 0 60 8) 国家自然科学基金重点项目 ( 60 13 3 0 2 0 )资助
关键词 图像水印系统 有效性 信息隐藏 密码学 图像特征 图像识别 安全性 Computer aided software engineering Cryptography Evaluation Image processing Numerical analysis Security of data
  • 相关文献

参考文献28

  • 1Anderson R ed. Information hiding. LNCS 1174, Berlin: Spinger-Verlag, 1996.
  • 2Aucsmith D ed. Information hiding. LNCS 1525, Berlin: Spinger-Verlag, 1998.
  • 3Pfitzmann A ed. Information hiding. LNCS 1768, Berlin: Spinger-Verlag, 1999.
  • 4Moskowitz I S ed. Information hiding. LNCS 2137,Berlin: Spinger-Verlag, 2001.
  • 5Katzenbeisser S, Petitcolas F A P. Information Hiding Techniques for Steganography and Digital Watermarking. Boston,London: Artech House,2000.
  • 6Cox I, Miller M L, Bloom J. Digital Watermarking. San Francisco,San Diego: Mogran Kaufemann Publishers, 2001.
  • 7Colins L. International between contract and tort in the conflict of laws. International and Comparative Law Quarterly, 1967,16:103.
  • 8Johnson N F, Durie Z, Jajodia S. Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Boston, Dordreeht, London: Kluwer Academic Publishers, 2001.
  • 9Johnson N F. Information hiding: Steganography, attacks,and countermeasures[Ph D dissertation]. School George Mason University, Virginia, USA,2000.
  • 10Kurak C, McHughes J. A cautionary note on image downgrading. In: Proceeding of IEEE Computer Security Application Conference, 1992. 153~159.

同被引文献140

引证文献16

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部