全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于脆弱性数字水印的图象完整性验证研究

DOI: 10.11834/jig.20030104

Keywords: 脆弱性数字水印,真伪鉴别

Full-Text   Cite this paper   Add to My Lib

Abstract:

计算机网络技术的飞速发展与信息媒体的数字化;使得在网络环境中对数字产品实施有效的内容保护成为一个迫在眉睫的现实问题.传统的数字签名技术只是用于对通信领域的信息传送进行篡改检测;而脆弱性数字水印技术则为网络环境下多媒体的内容保护提供了一个有效的解决方案.与鲁棒性水印不同的是;脆弱性水印主要用于检测发生在多媒体数据中的篡改;并对其定位.为了推动我国在此前沿领域研究工作的进一步深入;这里就当前脆弱性数字图象图象水印技术的基本特征、一般原理、研究现状、攻击方法及发展方向进行一个综述.

References

[1]  [30]Lu C S, Liao H M, Sze C J. Combined watermarking for image authentication and protection [A]. In: Proc. 1st IEEE Int.Conf. on Multimedia and Expo[C], New York City, NY, USA,Jul. 30~Aug. 2,2000.
[2]  [33]http://research. microsoft. com/~fabienpe/
[3]  [2]Lin T, Delp E J. A review of fragile image watermarks[A]. In:Multimedia and Security Workshop at ACM Multimedia 99[C],Orlando, FL, USA, 1999.
[4]  [3]Fridrich J. Methods for detecting changes in digital images[A].In: IEEE Workshop on Intelligent Signal Processing and Communication Systems[C], Melbourne, Australia, 1998.
[5]  [5]Yeung M, Mintzer F C. An invisible wtermarking technique for image verification[A]. In: International Conference on Image Processing. (ICIP\'97) [C], Washington DC, USA, 1997, 2:680~683.
[6]  [7]Lin C Y, Chang S F. Semi-Fragile watermarking for authenticating JPEG visual content[A]. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ, EI\' 00[C], San Jose, CA, USA, 2000.
[7]  [9]Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[R], CU/CTR Technical Report 486-97-19, Dec. 1997.
[8]  [11]Delp J, Podilchuk C I, Lin E T. Detection of image alterations using semi-fragile watermarks [A]. In: Proceedngs of SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ, EI\'00[C],San Jose, CA, USA, 2000,3971(14).
[9]  [13]Queluz M P. Content based integrity protection of digital images[A]. In: Proceedings of SPIE International Conf. on Security and Watermarking of Multimedia Contents, EI\'99 [C], San Jose, CA, U JSA, 1999,3675(9).
[10]  [14]Frifrich J, Goljan M. Protection of digital images using self embedding[A]. In: Symposium Content Security and Data Hiding in Digital Media[C], New Yark, NJ, USA, May 1999.
[11]  [16]Wolfgang R B, Delp E J. A watermark for digital images[A].In: IEEE International Conference on Image Processing(ICIP\'96)[C], Laussane, Switzerland, Oct. 1996.
[12]  [18]Queluz M P, Lamy P, Martinho J M et al. Spatial watermark for image verification[A]. In: Proceedings of SPIE International Conf. on Security and Watermarking of Multimedia Contents Ⅱ,EI\'00[C], San Jose, CA, USA, 2000,3971(11).
[13]  更多...
[14]  [21]Memon N, Shende S, Wong P. On the security of the YuengMintzer authentication watermark [A]. In: Proc. of the IS&T PICS 99[C], Savanna, Georgia, USA. 1999:301~306.
[15]  [23]Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper-proofing [A]. In: Proc. of the IEEE International Conference on Image Processing (ICIP\'98)[C],Chicago, Illinois, USA, 1998,2: 409~413.
[16]  [24]Arce G, Xie I. Joint wavelet compression and authentication watermarking [A]. In: Proc. of the IEEE International Conference on Image Processing ( ICIP\'98 ) [C], Chicago,Illinois, USA, 1998,2:427~431.
[17]  [26]Barnett R, Pearson D E. Attack operators for digitally watermarked images[J]. IEE Proceedings on Vision Image and Signal Processing, 1998,145 (4): 271~279.
[18]  [28]Hartung F, Su J K, Girod B. Spread spectrum watermarking:malicious attacks and counterattacks[J]. Proc. of SPIE, 1999,3657:147~158.
[19]  [1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey[J]. Proc. of the IEEE, Special Issue on Protection of Multimedia Content, 1999,87(7):1062~1078.
[20]  [4]Fridrich J. Methods for tamper detection in digital images[A].In: Multimedia and Security Workshop at ACM Multimedia 99[C], Orlando, FL, USA, 1999.
[21]  [6]Wong P W. A public key watermark for image verification and authentication [A]. In: Proc. of the IEEE International Conference on Image Processing (ICIP\' 98 ) [C], Chicago,Illinois, USA, 1998,1: 455~459,
[22]  [8]Lin C Y, Chang S F. A robust image authentication method surviving JPEG lossy compression[A]. In: Proceedings of SPIE International Conference on Storage and Retrieval of Image/Video Database, EI\'98[C], San Jose, CA, USA, 1998.
[23]  [10]Lin C Y, Chang S F. An image authenticator surviving DCT-based variable quantization table compressions [R], CU/CTR Technical Report 490-98-24, Nov. 1997.
[24]  [12]Marvel L M, Hartwig G, Boncelet C G. Compression compatible fragile and semi-fragile tamper detection[A]. In:Proceedings of SPIE International Conf. on Security and Watermarking of Multimedia Contents Ⅱ[C], San Jose, CA, USA,2000,3971(12).
[25]  [15]Fridrich J, Goljan M. Images with self-correcting capabilities[A]. In: IEEE International Conference on Image Processing(ICIP\'99)[C], Kobe, Japan, Oct. 1999.
[26]  [17]Yeung M, Mintzer F. Invisible watermarking for image verification[J], Journal of Electronic Imaging, 1998, 7 (3):578~591.
[27]  [19]Schyndel R V, Tirkel A, Osborne C. A digital datermark[A].In: Proc. of the IEEE International Conference on Image Processing (ICIP\'94)[C], Austin, Texas, USA, 1994, 2:86~90.
[28]  [20]Wolfgang R, Delp E. Fragile watermarking using the VW2D watermark [A]. In: Proc. of the IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents [C], San Jose, California, USA, 1999:204~213.
[29]  [22]Wu M, Liu B. Watermarking for image authentication[A]. In:Proc. of the IEEE International Conference on Image Processing(ICIP\'98) [C], Chicago, Illinois, USA, 1998,2: 437~441.
[30]  [25]华先胜.静止图象的局部化多类数字水印[D].北京:北京大学,2001.5.
[31]  [27]Craver S, Yeo B L, Yeung M. Technical trials and legal tribulations [J]. Communications of the ACM, 1998,41 (7):45~54.
[32]  [29]Dittmann J, Steinmetz A, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking [A]. In: Proc. IEEE Conference Multimedia Computing and Systems[C], Italy, 1999,2.
[33]  [31]Lu C S, Huang S K, Sze C J et al. Cocktail watermarking for digital image protection[J]. IEEE Trans. on Multimedia, 2000,2(4):209~224.
[34]  [32]Quisquater J J, Macq B, Joye M et al. Practical solution to authentication of images with a secure camera [A]. In:Proceedings of SPIE International Conference on Storage and Retrieval for Image and Video Databases [C], San Jose, CA,USA, 1997,3022:290~297.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133