期刊文献+

多媒体信息内容认证中的半脆弱数字水印技术 被引量:1

在线阅读 下载PDF
导出
摘要 重点分析了半脆弱数字水印的各种算法,比较了它们的特点,总结了半脆弱水印可能受到的攻击行为。探讨了半脆弱数字水印技术研究需要解决的问题和今后发展的方向。
出处 《计算机应用》 CSCD 北大核心 2007年第B06期268-270,共3页 journal of Computer Applications
  • 相关文献

参考文献21

  • 1LU CS,LIAO HYM.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,10(10):1579-1592.
  • 2秦川,单承赣.一种基于半脆弱水印的图像内容认证算法[J].信息安全与通信保密,2005,27(6):66-69. 被引量:2
  • 3张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 4张鸿宾,杨成.基于JPEG压缩不变量和半脆弱水印的图像认证[J].北京工业大学学报,2004,30(2):214-218. 被引量:7
  • 5何泉,苏广川.基于双重小波系数集的音频水印算法研究[J].北京理工大学学报,2004,24(2):170-173. 被引量:19
  • 6LIN ET,PLDILCHUK CI,DELP EJ.Detection of image alterations using semi-fragile watermarks[A].Proceedings of SPIE Conference on Security and Watermarking of Multi-media Contents Ⅱ[C].San Jose,California,USA,2000.152-163.
  • 7DITTMANN J.Content-fragile watermarking for image authentication[A].Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅲ[C].2001,4314:175 -184.
  • 8LAN TH,MANSOUR MF,TEWFIK AH.Robust high capacity data embedding[A].ICASSP 2001[C].2001.
  • 9EGGERS J,GIRLD B.Blind watermarking applied to image authentication[A].Proceedings of IEEE ICASSP[C].2001.
  • 10YANG SY,LU ZD,ZOU.FH.A Novel Semi-fragile Watermarking Technique for Image Authentication[A].ICSP'05 Proceedings[C].2005.2282-2285.

二级参考文献56

  • 1P-L Lin. Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software, 2001, 55(3):261~271
  • 2W Bender, D Gruhl, N Morimoto, et al. Techniques for data hiding. IBM Systems Journal, 1996, 35(3-4): 313-336
  • 3L Boney, Ahmed H Tewfik, Khaled N Hamdy. Digital watermarks for audio signals. The 8th European Signal Processing Conference(Eusipco), Triest, Italy, 1996
  • 4D G Hong, S H Park, J Shin. A public key audio watermarking using patchwork algorithm [ EB/OL]. http:∥www. kmutt. ac.th/itc2002/CD/pdf/17_07_45/WA2_PI/7. pdf. 2002-07
  • 5K-P Choi, K-Y Lee. An efficient audio watermarking by using spectrum warping. IEICE Trans on Fundamentals, 2002, E85-A (6): 1257~ 1264
  • 6M Swanson, B Zhu, A Tewfik, et al. Robust audio watermarking using perceptual masking . Signal Processing,1998, 66(3): 337~355
  • 7HOOh, J W Seok, J W Hong, et al. New echo embedding technique for robust and imperceptible audio watermarking. In:IEEE Int'l Conf on Acoustics, Speech, and Signal Processing (ICASSP). Piscataway, NJ: IEEE Press, 2001. 2362~2365
  • 8S Shlien. The modulated lapped transform, its time-varying forms, and applications to audio coding. IEEE Trans on Speech Audio Processing, 1997, 5(4): 359~366
  • 9H Malvar. Modulate complex lapped transform and its applications to audio processing. In: IEEE Int'l Conf on Acoustics, Speech,and Signal Processing(ICASSP). Piscataway, NJ: IEEE Press,1999. 1421~ 1424
  • 10[1]Cox I, Kilian J, Leighton F, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transaction on Image Proceeding, 1997, 6(12): 1673-1687.

共引文献53

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部