期刊文献+

数字水印的鲁棒性分析与研究 被引量:16

Analysis and study of robustness of digital watermarking
在线阅读 下载PDF
导出
摘要 讨论了数字图像水印系统的基本框架,简要介绍了系统各个组成部分所完成的功能。详细阐述了数字水印鲁棒性的概念、影响鲁棒性的因素、实现鲁棒性的策略以及鲁棒性评估的描述方法,并说明了鲁棒性在水印系统中的重要地位。最后基于盲检测器水印模型提出了一种估计水印鲁棒性的算法,并给出了算法的描述。由于该算法与扩频技术具有相同的理论依据并且计算过程比较简单,因此在理论上是合理有效的。 Thebasicframeofdigitalimagewatermarkingsystemisdiscussed, andthefunctionsofeverypartinthewatermarkingsystem is introduced briefly. The concept of the robustness, the factors affecting the robustness, the strategies used to realize the robustness and the methods evaluating the robustness are set forth at length and the importance of robustness in digital watermarking system is ex- plained. Finally, an arithmetic used to estimate the robustness of digital image watermarking system is put forward, which is based on the watermarking model withblind detector. And the descriptionof the arithmetic is given. Because thisarithmetic has the same academic gist with spread-spectrum technique and has easy computing process, it is reasonable and effective theoretically.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第3期614-616,共3页 Computer Engineering and Design
基金 甘肃省科技攻关基金项目(2GS033-A52-020)
关键词 鲁棒性分析 数字水印 算法 数字图像水印 系统 盲检测 描述方法 扩频技术 功能 估计 robustness fidelity anti-attack ability blind tester digital watermarking
  • 相关文献

参考文献6

  • 1Ingemar J Cox, Matt L Miller, Jeffrey A Bloom. Watermarking applications and their properties [A]. Iht Conf on Information Technology'2000, 2000.
  • 2Ingemar J Cox, Matt L Miller. A review of watermarking and the importance of perceptual modeling[C]. Proc of Electronic Imaging'97, 1997.
  • 3考克斯(Cox IJ).数字水印[M].北京:电子工业出版社,2003..
  • 4胡军全,黄继武,张龙军,黄达人.结合数字签名和数字水印的多媒体认证系统[J].软件学报,2003,14(6):1157-1163. 被引量:24
  • 5Voyatzis G, PitasI.Embedding robust logo watermarks in digital images[C].Proc of DSP'97,1997.213-216.
  • 6许剑峰,林嘉宜,黎绍发.一种基于中心对称性的聚类算法[J].计算机工程与设计,2003,24(5):94-96. 被引量:2

二级参考文献15

  • 1Eric Backer. Computer-Assisted Reasoning in Cluster Analysis[M]. Prentice Hall, 1995.
  • 2Su M C, et al. Application of Neural Network in Cluster Analysis[R]. 1997 IEEE International Conference,1997.1-6.
  • 3Dan Pelleg. Andrew Moore. Accelerating exact k-means algorithms with geometric reasoning. Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining[R]. 1999. 277-281.
  • 4Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 5Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 6Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 7Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 8Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 9Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 10Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.

共引文献24

同被引文献99

引证文献16

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部