全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

用于图象认证的数字水印技术

DOI: 10.11834/jig.200304138

Keywords: 计算机图象处理(520?6040),数字图象认证,脆弱性数字水印,半脆弱性数字水印

Full-Text   Cite this paper   Add to My Lib

Abstract:

随着多媒体网络通讯技术的飞速发展,数字信息的安全维护问题日益突出.目前,采用数字水印技术(即脆弱性数字水印和半脆弱性数字水印)进行数字图象的真实性、完整性认证已成为信息认证领域的研究热点.为使国内广大科技人员能够较全面地了解数字水印图象认证技术的发展现状,给出了用于图象认证的数字水印系统的基本框架、性能要求及常见的攻击方法,介绍了现有的各种算法,分析和总结了各自的优缺点,并提出了下一步的研究方向.

References

[1]  [2]Lin C Y, Chang S F. Issues and solutions for authenticating MPEG video[A]. In:Proc. of SPIE[C], San Jose, CA, USA,1999,3657:54~65.
[2]  [4]Queluz M P. Authentication of digital images and video: Generic models and a new contribution [J]. Signal Processing: Image Communication, 2001,16(5) :461~475.
[3]  [6]Wu M, Liu B. Attacks on digital watermarks[A]. In: Proc. of the IEEE Record of the Asilomar Conference on Signals,Systems and Computers [C], IEEE, USA. 1999, 2:1508 ~1512.
[4]  [8]Walton S. Information authentication for a slippery new age[J].Dr. Dobbs Journal, 1995,20(4): 18~26.
[5]  [11]Fridrich J, Goljan M. Images with self-correcting capabilities[A]. In: Proceedings of the IEEE International Conference on Image Processing[C]. Kobe, Japan, Oct. 1999,3:792~796.
[6]  [14]Noguchi Y, Kobayashi H, Kiya H. A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, 2000, E83-A (8) :1582~1588.
[7]  [16]Fridrich J. Methods for detecting changes in digital images[A].In:Proc. of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems[C], Melbourne,Australia, Nov. 1998, 173~177.
[8]  [18]Lin E T, Podilchuk C I, Delp E J. Detection of image alterations using semi-fragile watermarks [A]. In:Proc. of SPIE Security and Watermarking of Multimedia Contents Ⅱ[C], San Jose,CA,USA,Jan. 2000, 3971: 152~163.
[9]  更多...
[10]  [21]Zhu B, Swanson M D, Tewfik A H. Transparent robust authentication and distortion measurement technique for images[A]. In:Proc. of IEEE Digital Signal Processing Workshop[C],Loen, Norway, Sep. 1996, 45~48.
[11]  [23]Xie L, Arce G. Joint wavelet compression and authentication watermarking[A]. In: Proceedings of the IEEE International Conference on Image Processing [C]. Chicago, Illinois, Oct.1998, 2: 427~431.
[12]  [25]Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper-proofing[A]. In: Proceedings of the IEEE International Conference on Image Processing [C]. Chicago,Illinois, Oct. 1998, 2: 409~413.
[13]  [1]Dittmann J, Steinmetz A, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking [A]. In: Proc. of the 6th IEEE International Conference on Multimedia Computing and Systems [C],Florence, Italy, 1999,2:209~213.
[14]  [3]Lin E T, Delp E J. A review of fragile image watermarks[A].In: Proc. of the Multimedia and Security Workshop (ACM Multimedia\'99) Multimedia Contents[C], Orlando, FL, USA,1999:25~29.
[15]  [5]Memon N, Shende S, Wong P. On the security of the YeungMintzer authentication watermark [A]. In: Final Program and Proceedings of the IS&T PICS 99[C], Savanna, Georgia, 1999:301~306.
[16]  [7]Fridrich J, Goljan M, Memon N. Further attacks on YeungMintzer frigile watermarking scheme [A]. In: Proceedings of SPIE[C], San Jose, CA, USA, Jan. 2000,3971:428~437.
[17]  [9]Yeung M, Mintzer F. Invisible watermarking for image verification[J]. Journal of Electronic Imaging. 1998, 7(3): 578~591.
[18]  [10]Wong P W. A public key watermark for image verification and authentication[A]. In: Proceedings of the IEEE International Conference on Image Processing[C]. Chicago, Illinois, USA,Oct. 1998,1: 455~459.
[19]  [12]Lee J, Won C S. A watermarking sequence using parities of error control coding for image authentication and correction[J].IEEE Transactions on Consumer Electronics, 2000,46 (2) :313 ~317.
[20]  [13]Wu M, Liu B. Watermarking for image authentication[A]. In:Proceedings of the IEEE International Conference on Image Processing[C]. Chicago, Illinois, Oct. 1998, 2: 437~441.
[21]  [15]Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content [A]. In: Proc. of SPIE Security and Watermarking of Multimedia Contents Ⅱ[C], San Jose, CA, USA, Jan. 2000, 3971: 140~151.
[22]  [17]Fridrich J. Visual hash for oblivious watermarking [A]. In:Proceedings of SPIE [C], San Jose, CA, USA, Jan. 2000,3971: 286~294.
[23]  [19]Tefas A, Pitas I. Image authentication using chaotic mixing systems [A]. In: Proceedings of the IEEE International Symposium on Circuits and System[C], Geneva, Switzerland,May 2000, 1: 216~219.
[24]  [20]Rey C, Dujelay J L. Blind detection of malicious alterations on still images using robust watermarks [A]. In:IEE Secure Image Authentication colloquium[C], London, UK, Apr. 2000.
[25]  [22]Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001,10 (10) : 1579~1592.
[26]  [24]Said A, Pearlman W A. A new fast and efficient image codec based on set partitioning in hierarchical trees [J]. IEEE Trans.on Circuits and Systems for Video Technology, 1996, 6 (3):243~250.
[27]  [26]Yu G J, Lu C S, Liao H Y M et al. Mean quantization blind watermarking for image authentication[A]. In: Proc. of the IEEE International Conference on Image Processing [C],Vancouver, BC, Canada, 2000, 3: 706~709.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133