期刊文献+

图像数字水印的评估 被引量:2

Evaluation of Image Digital Watermarking System
在线阅读 下载PDF
导出
摘要 近年来,随着多种图像数字水印算法的提出,有必要建立一系列评估算法性能的标准。文章提出了检验图像水印算法稳健性和透明度的建议标准,包括测试对象、评估标准及一系列攻击方法,并给出了空域法和基于小波法下的图像水印质量的评估结果。 In the last few years,digital watermarks have been proposed as a solution for solving the illegal copying and proof of ownership problem in the context of multimedia objects.But it is still difficult to have a rough standard of their performances and hence to compare them.So we propose a benchmark to compare image watermarking on a fair basis.
作者 刘彤 裘正定
出处 《计算机工程与应用》 CSCD 北大核心 2001年第23期91-92,98,共3页 Computer Engineering and Applications
关键词 图像数字水印 稳健性 透明度 信息安全 评估 Digital image watermarking,robustness,transparency,attacks,performance
  • 相关文献

参考文献5

二级参考文献19

  • 1张建伟.概念转变模型及其发展[J].心理科学进展,1998,8(3):34-38. 被引量:53
  • 22.Ingemar J Cox,Joe Kilian,Tom Leighton et al.A Secure Robust Watermark for Multimedia.In Information Hiding' 96,Springer- Verlay,1996,185-206
  • 37.Raymond B Wolfgang,Edward J Delp.Overview of images secur- ity techniques with applications in multimedia systems
  • 48.Raymond B Wolfgang,Edward J Delp.A watermark technique for digital imageryFurther studies
  • 59.Birgit Pfitzmann.Digital Signature SchemesGeneral Framework and Fail-Stop Signatures. Springer_Verlag,1995
  • 6江早,中国图象图形学报,1998年,3卷,1期,83页
  • 7Xia Xianggen,ICIP,1997年,548页
  • 8Yeung M M,ICIP,1997年,357页
  • 9Zeng W,ICIP,1997年,552页
  • 10Watson A B,SPIE.2657,1996年,2657期,381页

共引文献366

同被引文献10

  • 1杨树国,李春霞,徐耀群,谢荣生.数字水印技术及其攻击分析[J].哈尔滨商业大学学报(自然科学版),2002,18(2):166-170. 被引量:9
  • 2Cox I J, Miller M L, Bloom J A. Watermarking applications and their properties, int. conf. On Information Technology 2000. Las Vegas.
  • 3Caronni G. Ermitteln unauthorisierter verteriler maschinenlesbaren daten. Technical report, ETH Ziirich, Switzerland, August, 1993.
  • 4Kuhn M G,and Petitcolas F A P. a Fair Benchmark for Image Watermarking Systems. Electronic Imaging'99, Security and Watermarking of Mulitimedia Contents, 1999 (3657).
  • 5Kuhn M G. and Petitcolas F A P. StirMark:http://www. cl. cam. ac. uk-fapp2/watermarking/stirmark/.
  • 6I.J.Cox,Matt L.Miller and Jeffrey A.Bloom,Watermarking applications and their properties.int.conf.On Information Technology2000.Las Vegas.
  • 7G.Caronni Ermitteln unauthorisierter verteriler maschinenlesbaren daten.Technical report ,ETH Ziirich,Switzerland,August,1993.
  • 8V.Solachidisv,TefasA,NikolaidisN,TsekeridouS,KikolaiddisA,PitasI.A benchmarking protocol for watermarkin methods.In:Proceeding of 2001 IEEE International conference Image Processing(ICIP'01),Thessaloniki,Greece,2001.1023~1026.
  • 9M.G.Kuhn,and F.A.P.Petitcolas.a Fair Benchmark for Image Watermarking Systems.Electronic Imaging'99,Security and Watermarking of Mulitimedia Contents,1999(3657).
  • 10王道顺,梁敬弘,戴一奇,罗颂,齐东旭.图像水印系统有效性的评价框架[J].计算机学报,2003,26(7):779-788. 被引量:16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部