期刊文献+

数字水印技术与算法实现 被引量:6

The Technique of Digital Watermarking and the Algorithm Realization
下载PDF
导出
摘要 综述了数字水印技术的起源、概念、特点和应用;提出了数字水印处理技术的基本框架;列出了一些主要的基于图像的水印嵌入算法和水印检测算法;并展望了水印处理技术的未来发展趋势;最后给出了一种基于DCT变换的水印嵌入与检测算法。 In this paper, the overview of Digital watermarking techniques is given first, which includes the origin, definition,characteristic and application of digital watermarking. then the general image watermarking framework is presented, some main algorithms of watermarking embedding and detection are also listed.at last, the further trends of the digital watermarking is forecast.
出处 《测绘学院学报》 北大核心 2003年第3期201-205,共5页 Journal of Institute of Surveying and Mapping
关键词 数字水印 版权保护 鲁棒性 图像水印 水印嵌入算法 水印检测算法 digital watermarking copyright protection robustionness image watermark
  • 相关文献

参考文献11

二级参考文献58

  • 1[1]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.
  • 2[2]N. Memon, P. W. Wong, Protecting digital media content, Communications of the ACM, 1998, 41(7), 35-43.
  • 3[3]S. Crave, B. L. Yeo, M. Yeung, Technical trials and legal tribulations, Conmmnieations of theACM, 1998, 41(7), 45-54.
  • 4[4]G.C. Langelaar, R. L. Lagendijk, J. Biemond, Renoving spatial spread spectrum watermarks bynon-linear filtering, EUSIPCO'98, 1998, 2281-2284.
  • 5[5]I.J. Cox, J. M. G. Linnartz, Some general methods for tampering with waternarks, IEEE J. onSelected Areas in Communications, 1998, SAC-16(4), 587 593.
  • 6[6]http://wwvw.cl.cam.ac.uk/users/fapp2/.
  • 7[7]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? Proceedings of IS&T/SPIE Electronic Imaging-Storage and Retrieval of Image and VideoDatabases, San Jose. S, CA: SPIE, Feb. 13-14, 1997, 310-321.
  • 8[8]S. Craver, N. Memon, B. L. Yeo, M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of the IEEE International Conf. on Image Processing, Santa Barbata, CA,IEEE Press, 1997, 540-543.
  • 9[9]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Resolving rightful ownerships with invisible wa-termarking techniques: limitations, attacks, and implications, IEEE J. on Selected Areas inComnunications, 1998, SAC-16(4), 573-586.
  • 10[1]E. Koch, J. Zhao, Towards robust and hidden image copyright labeling, Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Halkidiki, Greece, June 20-22, 1995, 452-455.

共引文献682

同被引文献10

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部