期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于数字水印的视频多点广播立即源认证模型
1
作者 吕宝利 赵安军 《现代电子技术》 2005年第14期68-70,共3页
提出一种视频多点广播立即源认证模型。在TESLA多点广播源认证的基础上,采用基于查找表的视频水印算法,将视频重要分量的消息认证码、公开密钥和立即认证散列信息作为数字水印嵌入到视频的非重要分量中,达到视频数据的立即源认证;同时... 提出一种视频多点广播立即源认证模型。在TESLA多点广播源认证的基础上,采用基于查找表的视频水印算法,将视频重要分量的消息认证码、公开密钥和立即认证散列信息作为数字水印嵌入到视频的非重要分量中,达到视频数据的立即源认证;同时节约一定的传输带宽,并给出公开延迟时间间隔的一种计算方法。 展开更多
关键词 视频多点广播 立即源认 证数字水印 TESLA 公开延迟时间
下载PDF
IDENTIFICATION OF INPAINTED IMAGES AND NATURAL IMAGES FOR DIGITAL FORENSICS
2
作者 Wu Qiong Sun Shaojie Zhu Wei Li Guohui 《Journal of Electronics(China)》 2009年第3期341-345,共5页
Image forensics is a form of image analysis for finding out the condition of an image in the complete absence of any digital watermark or signature.It can be used to authenticate digital images and identify their sour... Image forensics is a form of image analysis for finding out the condition of an image in the complete absence of any digital watermark or signature.It can be used to authenticate digital images and identify their sources.While the technology of exemplar-based inpainting provides an approach to remove objects from an image and play visual tricks.In this paper, as a first attempt, a method based on zero-connectivity feature and fuzzy membership is proposed to discriminate natural images from inpainted images.Firstly, zero-connectivity labeling is applied on block pairs to yield matching degree feature of all blocks in the region of suspicious, then the fuzzy memberships are computed and the tampered regions are identified by a cut set.Experimental results demonstrate the effectiveness of our method in detecting inpainted images. 展开更多
关键词 Image authentication Image inpainting Fuzzy membership
下载PDF
A Semi-Fragile Wavelet Transform Watermarking Scheme for Content Authentication of Images
3
作者 宋好好 张艳 邹春明 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期569-573,共5页
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT suc... A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet(EZW) ,set partitioning in hierarchical trees(SPIHT) and embedded block coding with optimized truncation(EBCOT) in JPEG2000 to a pre-determined bit-plane,but is sensitive to all other malicious attacks.The image features are generated from the lowest-frequency(LF) subband of the original image as the embedded watermark.The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband.In the process of watermarking authentication,we compare the image features generated from the LF subband of the received image with the embedded watermarking information(the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably(the embedded wavelet compression) .The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark,so the received image authentication needs no information about the original image or watermark.Experimental results prove the effectiveness of our proposed watermarking scheme. 展开更多
关键词 WAVELET image watermarking information security SEMI-FRAGILE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部