全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于JPEG压缩不变量和半脆弱水印的图像认证

Keywords: 图像认证,数字水印,JPEG压缩,数字签名

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了检测和定位对图像的恶意窜改,同时验证图像的所有权,提出了一种基于JPEG压缩不变量和半脆弱水印的JPEG压缩域认证水印算法.该算法利用了JPEG压缩前后DCT系数的不变性嵌人和图像内容有关的水印.该认证算法建立在密码学方法的基础上,因此它是单向的、不可逆的.

References

[1]  WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication andownership verification[J]. IEEE Trans on Image Processing, 2001, 10(10) : 1593-1601.
[2]  WU M, LIU B. Watermarking for image authentication[J]. Proc ICIP, 1998, 2(10) : 437-441.
[3]  LIN E T, DELP E J. A review of fragile image watermarks[Z]. Orlando: Proc of the Multimedia and Security Workshop ACM Multimedia'99) , 1999.
[4]  WALTON S. Information authentication for a slippery new age[J]. Dr Dobbs Journal, 1995, 20(4) : 18-26.
[5]  van SCHYNDEL R, TIRKEL A , OSBORCE C. A digital watermark[J]. Proc ICIP, 1994, 2(11) : 86-90.
[6]  WOLFGANG R B , DELP E J. Fragile watermarking using the VW2D watermark[Z]. Proc SPIE, Security andWatermarking of Multimedia Contents, San Jose, 1999.
[7]  YEUNG M, MINTZER F. Invisible watermarking for image verification[J]. Journal of Electronic Imaging, 1998,7(3) : 578-591.
[8]  WONG P W. A public key watermark for image verification and authentication[J]. Proc ICIP, 1998, 2(10) :455-459.
[9]  KUNDUR D, HATZINAKOS D. Towards a telltale watermarking technique for tamper-proofmg[J]. Proc ICIP,1998, 2(10) : 409-413.
[10]  XIE L, ARCE G. Joint wavelet compression and authentication watermarking[J]. Proc ICIP, 1998, 2(10) :427-431.
[11]  LIN Ching-yung. Watermarking and digital signature techniques for multimedia authentication and copyright protection[D]: [dissertation]. New York: Columbia University, 2000.
[12]  CALDERBANK R, DAUBECHIES I, SWELDENS W, et al. Wavelet transforms that map integers to integers[J]. Appl Comput Harmon Anal, 1998, 5(3) : 332-369.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133