期刊文献+

基于数字水印的图像认证技术 被引量:1

Image Authentication Based on Digital Watermarking
下载PDF
导出
摘要 伴随着计算机网络及通信技术的飞速发展,数字图像认证技术已成为目前研究的一个热点.对基于数字签名和基于数字水印的认证技术进行了比较,在此基础上阐述了数字水印技术的特征,认证系统框架,详细讨论了数字水印图像认证算法的研究现状,并对其未来发展方向进行了展望. With the development of Internet and communication technology, image authentication has been under active study in recent years. Both digital signature and digital watermarking can be utilized for image authentication,there are compared in this paper, then the feature of digital watermarking and frame of authentication system based on watermarking are proposed. Finally, the future development of digital watermarking for image authentication is also analyzed and conjectured in the paper.
出处 《河南科学》 2007年第6期984-987,共4页 Henan Science
关键词 图像认证 数字水印 数字签名 篡改检测 image authentication digital watermarking digital signature tamper detection
  • 相关文献

参考文献8

  • 1汪小帆等编著..信息隐藏技术 方法与应用[M].北京:机械工业出版社,2001:181.
  • 2杨义先,钮心忻,任金强..信息安全新技术[M],2002.
  • 3Cox I J, Miller M L, Bloom J A. Digital Watermarking [M]. New York: Academic Press, 2002. 被引量:1
  • 4王朔中,张新鹏,张开文著..数字密写和密写分析 互联网时代的信息战技术[M].北京:清华大学出版社,2005:177.
  • 5孙圣和,陆哲明,牛夏牧等著..数字水印技术及应用[M].北京:科学出版社,2004:714.
  • 6CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003.. 被引量:31
  • 7吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 8张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35

二级参考文献66

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001 被引量:1
  • 3Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583 被引量:1
  • 4Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690 被引量:1
  • 5Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441 被引量:1
  • 6Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274 被引量:1
  • 7Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004 被引量:1
  • 8Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609 被引量:1
  • 9Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591 被引量:1
  • 10Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441 被引量:1

共引文献130

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部