期刊文献+

一种基于海明码的二值图像水印检测方法 被引量:1

A binary image watermark authentication method based on Hamming Code
在线阅读 下载PDF
导出
摘要 结合二值水印图像的特点,运用海明码的监督关系式,首次提出了一种基于海明码的像素级数字水印检测方法.在认证检测时,仅利用一幅与水印图像内容毫不相关的检测图,通过异或运算操作就可以准确确认某像素点是否被篡改,并具有篡改定位与修复能力,省略了一般水印检测方法的图像匹配、逆变换与相似计算等复杂操作. Based on the characteristics of the binary image, we present a digital watermark authentication method with the supervisory relationship of Hamming Code. By generating a watermark detection map, we can accurately confirm whether a certain pixel point is altered without the original watermark, and tamper with the positioning and repairing capacity. Compared with the general detection method, this method is more flexible in that it skips such complicated processes as image match, inversion exchange and similar calculation.
出处 《南昌工程学院学报》 CAS 2009年第1期1-7,共7页 Journal of Nanchang Institute of Technology
基金 国家自然科学基金资助项目(70361002) 江西省教育厅科学技术研究项目(GJJ07344) 江西省科技厅科技支撑项目
关键词 海明码 监督关系式 检测图 Hamming Code supervisory relationship detection map
作者简介 陆伟锋(1968-),男,教授,博士,硕导,主要从事管理信息系统、信息安全等方面研究.
  • 相关文献

参考文献20

  • 1Dittmann J, Steinmetz A, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking [ C ]//Proc of the 6th IEEE International Conference on Multimedia Computing and Systems. Italy, F lorence: 1999,2 : 209 - 213.
  • 2Lin E T, Delp E J. A review of fragile image watermarks[ C ]//Proc of the Multimedia and Security Work shop (ACMM Ultimedia'99) Multimedia Contents. USA : Orlando, FL , 1999 : 25 - 29.
  • 3Lin C Y, Chang S F. Issues and solutions for authenticating MPEG video[ C ]//Proc of SPIE, USA : San Jose, CA, 1999,3657 : 54 - 65.
  • 4Walton S.Information authentication for a slippery new age[J]. Dr Dobbs Journal, 1995,20 (4) : 18 - 26.
  • 5Yeung M, Mintzer F. Invisible watemlarking for image verification[ J ]. Journal of Electronic Imaging, 1998,7 (3) : 578 - 593
  • 6Wu M,Liu B. Watermarking for image authentieafion[C]//Proc of the IEEE International Conference on Image Processing. Chicago, Illinois, Oct. 1998,2:437 - 441.
  • 7Lin E T, Podilchuk C I, Delp E J. Detection of image alterations using semi-fragile watermarks[C]//Proc of SPIE Security and Watermark ing of Multimedia Contents Ⅱ, San Jose, CA, USA, Jan. 2000,3971 : 152 - 163.
  • 8Xie L, A tee G. Joint wavelet compression and authentication watermarking[ C]//Proc of the IEEE International Conference on Image Processing. Chicago, Illinois, Oct. 1998,2 : 427 - 431.
  • 9Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper2 proofing[ C]//Proc of the IEEE International Conference on Image Processing, Chicago, Illinois, Oct. 1998,2:409 - 413.
  • 10熊桂喜,王小虎.计算机网络:3版[M].北京:清华大学出版社,2000.

二级参考文献43

  • 1[1]Hartung F, Kutter M. Multimedia Watermarking Techniques.Proceeding of the IEEE,1999,87(7):1079~l107
  • 2[2]Brassil J T, Low S, Maxemchuk N F. Copyright Protection for the Electronic Distribution of Text Documents. Proc. of the IEEE,1999,87(7) :1181~1196
  • 3[3]Pitas I. A Method for Signature Casting on Digital Images. In:Processings of ICIP,vol 3, IEEE press, 1996. 215~218
  • 4[4]Schneier B. Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley & Sons,Inc. 1996
  • 5[5]Craver S,et al. Resolving Rightful Ownership With Invisible Watermarking Techniques: Limitions, Attacks, and Implications.IEEE Journal on Selected Areas of Communications, special issue on Copyright and Privacy Protection, April 1998(IBM Research Report,RC 20755 ,March 1997)
  • 6Podilchuk C I,IEEE J Special Areas Communications,1998年,16卷,4期,525页
  • 7Koch E,Proceedings of 1995 IEEE Workshop on NonlinearSignal and Image Processing,1995年,452页
  • 8Petitcoals F A P, Anderson R J, Kuhn M. Information hid ding-A survey. Proceedings of the IEEE, 1999, 87(7):10791107
  • 9Hartung F, Kutter M. Multimedia watermarking techniques. Proceedings of the IEEE, 1999, 87(7): 1079- 1107
  • 10Podilchuk C I, Zeng W. Image-adaptive watermarking using vi sual models. IEEE Journal on Selected Areas in Communication, 1998, 16(4):525-539

共引文献73

同被引文献22

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部