期刊文献+

图像版权保护在数码相机中的应用 被引量:1

Application of Image Rights Management in Numeral Camera
在线阅读 下载PDF
导出
摘要 运用数字水印来实现版权保护已经得到广泛应用,但数字水印信息的嵌入都是在数字图像成相后通过计算机来嵌入的,在现有的数码相机中并没有这一功能。本文介绍的方法是在数码相机照相过程中将数字水印信息嵌入,或成相后在数码相机中将水印信息嵌入。这样一方面增加数码相机一项功能,另一方面又及时保护了数字图像或数字视频在数码相机中的版权,防止在未加水印信息之前图像或视频被盗。 Implementing rights management by digital watermarking technology have been extensively applied, But digital watermarking embedding is executed by computer after imaging, and there is not the function about data embedding in the modern numeral camera. This paper proposed a method that data embedding is during shooting a image or after imaging in numeral camera. On the one hand ,this method can add a function .on the other hand, that protect digital image or video rights, and prevent image or video from being stealled before no embedding information.
出处 《上饶师范学院学报》 2006年第6期79-84,共6页 Journal of Shangrao Normal University
关键词 图像版权 数字水印 数码相机 图像压缩 视频压缩 Index terms-image rights management eigital watermarking numeral camera image compresa video compress
作者简介 毛家发(1970-),男,江西玉山人,博士研究生,上饶师范学院数学与计算机系讲师,主要研究方向为图像处理、模式识别与人工智能、计算机视觉、数字水印与隐藏住处检测。
  • 相关文献

参考文献9

  • 1陈士文.数码相机及其记录影像与印刷复制尺寸的关系[J].北京印刷学院学报,2002,10(3):9-11. 被引量:4
  • 2A. Westfeld. F5 a Steganographic Algorithm: High Capacity Despite Better Steganalysis[J]. 4th International Workshop on Information Hiding, 2001.
  • 3Johnson, N.F. and Jajodia. S. Exploring Steganography: Seeing the Unseen.IEEF. Computer Mag[EB/OL]. February 1998. URL:http://www.jjtc.com/pub/r2026.pdf.
  • 4IF. Collin. Encryptpic[EB/OL]. http://www.winsite.com/bin/Info.
  • 5G. Puleini[ EB/OL]. Stegotif. http://www.geocities. com/SiliconValley/9210/gfiee.html.
  • 6胡军全,黄继武,张龙军,黄达人.结合数字签名和数字水印的多媒体认证系统[J].软件学报,2003,14(6):1157-1163. 被引量:24
  • 7Alexandre H. Paquet, Rahab K.Ward. Wavelet- based Digital Watermarking for Image Authentication[J]. In: IEEE Canadian Conference on Electrical and Computer Engineering,2002,12(5) :879-884.
  • 8T.Y. Chung, K. S. Park, Y. N. Oh, D. H. Shin and S. H. Park. Digital. watermarking for copyright protection of MPEG2 compressed video [J]. Transaction on Consumer Electronics, 1998,44(3) :895- 901.
  • 9J.Zhang, J. G. Li and L.Zhang.Video watermark technique in motion vector[ J]. Proc. of XIV Brazilian Symposium on Computer Graphics and Image Processing,2001, (10) :179 - 182.

二级参考文献17

  • 1毛家发,林家骏,戴蒙.图像版权保护在数码相机中的应用[J].上饶师范学院学报,2006,26(6):79-84. 被引量:1
  • 2Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 3Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 4Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 5Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 6Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 7Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 8Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.
  • 9Lou DC, Liu JLo Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46(1):31-39.
  • 10Deng H, Gong L, Lazer A, et al. Practical protocols for certified electronic mail. Journal of Network and System Management,1996.4(3 ):279-297.

共引文献26

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部