全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

数字水印技术研究进展

DOI: 10.11834/jig.20010229

Keywords: 信息隐藏,数字水印,版权保护,水印攻击分析

Full-Text   Cite this paper   Add to My Lib

Abstract:

随着因特网的日益普及,多媒体信息交流达到了前所未有的深度和广度,但作品侵权也随之更加容易,篡改也更加方便,因此,如何保护作品版权已受到人们的高度重视,而如今信息隐藏技术,特别是数字水印技术作为版权保护的重要手段,已得到广泛的研究和应用,为了使人们对该技术有一个较全面的了解,因而对数字水印技术的研究与进展情况进行了较系统的论述,即首先对信息隐藏技术进行了介绍,并对该技术进行了分类,然后重点分析了数字水印技术的模型、典型算法及其攻击方法,最后对数字水印技术的研究发展及其应用前景指出了一些可能的方向。

References

[1]  [2]Bender W, Gruhl D, Morimoto N et al. Techniques for data hiding. IBM System Journal, 1996,35(3&4):313~336.
[2]  [4]Voyatzis G, Nikolaidis N, Pitas I. Digital watermarking: An overview. In:9th European Signal Processing Conference, Island of Rhodes, Greece, 1998:9~12.
[3]  [5]Jiri Fridrich. Applications of data hiding in digital images. In:the ISPAC\'98 Conference in Melbourne, Australia, 1998.11.
[4]  [6]Mahalingam Ramkumar. Data hiding in multimedia-theory and applications.[Ph.D. Degree], New Jersey: Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
[5]  [7]Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92~99.
[6]  [8]向辉. 基于信息重组思想的多媒体数据压缩与多媒体数据安全技术研究[博士学位论文]. 杭州:浙江大学CAD&CG国家重点实验室,1999.
[7]  [9]Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102~112.
[8]  [10] Van Schyndel R, Tirkel A, Osborne C. A digital watermark. In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex., IEEE Press, 1994:86~90.
[9]  [12] Nikolaidis N, Pitas I. Copyright protection of images using robust digital signatures. In: IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta, IEEE Press, 1996:2168~2171.
[10]  [15] Hui Xiang et al. Digital watermarking systems with chaotic sequences. SPIE Proceeding on Security and Watermarking of Multimedia Contents, San Jose, 1999,3657:449~457.
[11]  更多...
[12]  [21] Christine I Podilchuk, Zeng Wenjun. Digital image watermarking using visual models. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:100~111.
[13]  [24] 黄继武, SHI YunQ, 姚若河. 基于块分类的自适应图象水印算法. 中国图象图形学报,1999,4(8):640~643.
[14]  [26] Petitcolas Fabien A P, Anderson Ross J, Kuhn Markus G. Attacks on copyright marking systems. In: Information Hiding\'98 Conference, Second International Workshop, Volume Springer Lecture Notes in Computer Science, Portland, Oregon, USA, 1998,1525:218~238.
[15]  [28] Emil Praum et al. Robust mesh watermarking. http://www.cs.princeton.edu/gfx/proj/meshwm, 1999.
[16]  [1]Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996.8,143(4):250~256.
[17]  [3]Kobayashi. Digital watermarking: Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
[18]  [11] Maxemchuk N F. Electronic document distribution. AT&T Technical Journal, 1994.9,73(5):73~80.
[19]  [13] Hartung F, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding. SPIE Proceeding on Multimedia Computing and Networking, San Jose, 1997,3020:264~273.
[20]  [14] Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio. SPIE Proceedings on Security and Watermarking of Multimedia Contents, San Jose, 1999,3657:194~202.
[21]  [16] Zhao J, Koch E. Embedding robust labels into images for copyright protection. In: Proceedings of the KnowRight\'95 Conference on Intellectual Property Rights and New Technologies ,Vienna, Austria, 1995:241~251.
[22]  [17] Cox I J, Kilian J, Leighton T et al. A secure, robust watermark for multimedia. In: Proceedings of Info Hiding\'96, Cambridge University, London, England, 1996:185~206.
[23]  [18] Barni M, Bartolini F, Cappellini V et al. A DWT-based technique for spatial-frequency masking of digital signatures. SPIE Proceeding on Security and Watermarking of Multimedia Contents, 1999,3657:31~39.
[24]  [19] Cox I J, Kilian J, Leighton T et al. Secure spread spectrum watermarking for images, audio and video. IEEE Proceeding on International Conference on Image Processing, 1996,3:243~246.
[25]  [20] Cox I J, Kilian J, Leighton T et al. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997,6(12):1673~1687.
[26]  [22] 韦志辉等. 基于小波域中视觉门限模型的数字水印技术. 东南大学学报, 1998,28(5):44~48.
[27]  [23] 黄继武, SHI YunQ. 一种自适应图象水印算法. 自动化学报, 1999,25(4):477~482.
[28]  [25] 易开祥,石教英. 一种自适应二维数字水印算法. 见:全国第二届信息隐藏学术研讨会论文集, 北京.2000:108~112.
[29]  [27] Scott Craver, Nasir Memon, Boon-Lock Yeo. Resolving rightful ownerships with invisible watermarking techniques:limitations, attack, and implications. IEEE journal on selected areas in communication, 1998,16(4):573~586.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133