期刊文献+

基于扩频的非对称数字水印 被引量:8

Asymmetric Watermark Based on Spread Spectrum
在线阅读 下载PDF
导出
摘要 1.引言 随着多媒体技术和网络技术的飞速发展和广泛应用,数字图像、音频和视频等多媒体数字产品愈来愈需要一种有效的版权保护方法,数字水印技术就是针对这一问题而提出来的. Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Many different schemes have been proposed in the last few years, but most of them are symmetric, i. e. , the key used for watermarking embedding is just the same used for watermarking detection. However, in many applications we need an asymmetric scheme, where a private key is used for watermark embedding, and a public key is used for watermark detection. Recently some asymmetric watermark schemes have been proposed. In this paper, we study one watermark scheme based on spread spectrum.We propose a way to generate public/private key to prevent the cheat of the copyright owner, and reducing the information need for watermark detection. Then we study the some problems of the watermark detection, and give a modified watermark detection schemes.
出处 《计算机科学》 CSCD 北大核心 2002年第9期63-65,共3页 Computer Science
基金 中科院计算所创新课题"高性能媒体服务器"的资助
关键词 扩频通信 非对称数字水印 宽带信道 宿主信号 版权保护 Digital watermark, Asymmetric watermark,Spread spectrum,Random number
  • 相关文献

参考文献5

  • 1Cox I J ,et al. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing, 1997,6:1673~1687
  • 2Hartung F , Girod B. Digital Watermarking of Raw and Compressed Video. In:Proc. SPIE 2952: Digital Compression Technologies and Systems for Video Communication, Oct. 1996. 205~213
  • 3Pitas I. A method for signature casting on digital images. Proc. of Intl. Conf. on Image Processing, 1996(3):215~218
  • 4Hartung F , Girod B. Fast Public-Key Watermarking of Compressed Video, In:Proc. of the IEEE Intl. Conf. on Image Processing 1997 , Santa Barbara, CA, USA, Oct. 1997
  • 5Eggers J J,et al. Asymmetric Watermarking Schemes, Sicherheit in Mediendaten, GMD Jahrestagung, Proceedings, Springer Verlag, 2000

同被引文献42

  • 1桂国富,蒋铃鸽,何晨.一种基于多检测水印的非对称水印系统[J].上海交通大学学报,2006,40(11):1873-1876. 被引量:1
  • 2[1]Proakis J G.数字通信.第四版,北京:电子工业出版社,2004
  • 3Hartung F,Girod B.Fast public-key watermarking of compressed vide[C]. In:Proc of the IEEE Int Conf on Image Processing, 1997-10; 1: 528-531.
  • 4Furon T, Duhamel.Robustness of asymmetric watermarking technique[C].In:Proc of the Int conf on image Processing,Vancouver, Canada, Vol 3,2000-09 : 21-24.
  • 5Picard J,Robert A.On the public key watermarking issue[C].In:Proc of SPIE Security and watermarking of Multimedia contents Ⅲ,San Jose,Vol 4314,2001-01:290-299.
  • 6Van Schyndel,Tirkel A,Svalbe I.Key independent watermarking detection[C].In:Proc of the IEEE Intl Conf on Multimedia Computing and Systems, Florence, Italy, 1999-06 : 1.
  • 7Eggers I J,Su J K,Girod B.Public key watermarking by eigenvectors of liner transforms[C].In:Proc of European Signal Processing conf, Tampre, Finland, 2000-04.
  • 8Hyuk C ,Kiryumg L,Tacjeong K.Transformed-Key Asymmmetric Watermarking System[J].IEEE Signal Processing Letters, 2004 ; 11 (2) : 251 -254.
  • 9Eggers I J,Su J K,Girod B.Asymmetric watermarking schemes, Sicherheit in Mediendatern[C].In :GMD jahrestagung,Proceedings, Springer Verlag, 2000.
  • 10P Tomsich,S Katzenbeisser.Copyright Protection Protocols for Multimedia Distribution Based on Trusted Hardware.In Protocols for Multimedia Systems,Proceedings,2000:249~256

引证文献8

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部