A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the waterm...A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way.展开更多
The last ten years have seen rapidly growing in the field of digital watermarks. Meanwhile ,a large numberof attacks appears as fast as new algorithms are proposed,which emphasizes the limits and weaknesses of those a...The last ten years have seen rapidly growing in the field of digital watermarks. Meanwhile ,a large numberof attacks appears as fast as new algorithms are proposed,which emphasizes the limits and weaknesses of those algo-rithms. The tools ,methodologies and benchmarking of assessing the current algorithms are almost non-existent. Thispaper reviews a number of applications of digital watermarking and their properties ,describes and classifies a numberof attacks on digital watermarks,and analyzes the Stirmark ,Checkmark,Optimark benchmarking systems. At end,wegive some comment on the watermarking research.展开更多
基金This project supported by the National Natural Science Foundation (No. 69802002,69882002, 69772035) and the National Project " 8
文摘A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way.
文摘The last ten years have seen rapidly growing in the field of digital watermarks. Meanwhile ,a large numberof attacks appears as fast as new algorithms are proposed,which emphasizes the limits and weaknesses of those algo-rithms. The tools ,methodologies and benchmarking of assessing the current algorithms are almost non-existent. Thispaper reviews a number of applications of digital watermarking and their properties ,describes and classifies a numberof attacks on digital watermarks,and analyzes the Stirmark ,Checkmark,Optimark benchmarking systems. At end,wegive some comment on the watermarking research.