首页 | 本学科首页   官方微博 | 高级检索  
     

用于图象认证的数字水印技术
引用本文:张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报,2003,8(4):367-378.
作者姓名:张静  张春田
作者单位:天津大学电子信息工程学院 天津300072 (张静),天津大学电子信息工程学院 天津300072(张春田)
基金项目:国家自然科学基金 ( 69972 0 3 2 ),天津市自然科学基金 ( 0 13 60 13 11)
摘    要:随着多媒体网络通讯技术的飞速发展 ,数字信息的安全维护问题日益突出 .目前 ,采用数字水印技术 (即脆弱性数字水印和半脆弱性数字水印 )进行数字图象的真实性、完整性认证已成为信息认证领域的研究热点 .为使国内广大科技人员能够较全面地了解数字水印图象认证技术的发展现状 ,给出了用于图象认证的数字水印系统的基本框架、性能要求及常见的攻击方法 ,介绍了现有的各种算法 ,分析和总结了各自的优缺点 ,并提出了下一步的研究方向 .

关 键 词:计算机图象处理(520·6040)  数字图象认证  脆弱性数字水印  半脆弱性数字水印
文章编号:1006-8961(2003)04-0367-07
修稿时间:2001年8月16日

Digital Watermarking Techniques for Image Authentication
ZHANG Jing and ZHANG Chun,tian.Digital Watermarking Techniques for Image Authentication[J].Journal of Image and Graphics,2003,8(4):367-378.
Authors:ZHANG Jing and ZHANG Chun  tian
Abstract:The growth of networked multimedia systems has made digital data acquisition, exchange and transmission a simple task, but the ease of copying and editing also facilitates unauthorized use, misappropriation and misrepresentation, which makes it necessary to authenticate the multimedia data. At present, it has been a hotspot to authenticate digital images by the use of watermarking. According to the objectives of authentication, an image authentication system can be classified into complete verification and content verification. Watermarking for complete verification (known as fragile watermarking) considers image data as untouchable messages such that the data for authentication have to be exactly the same as the original. Content verification is a characteristic of multimedia data authentication. Watermarking for content verification (known as semi fragile watermarking) considers "information preserving" image manipulations, such as compression and format conversion, as acceptable. This paper presents the general framework of digital watermarking for image authentication, discusses the fundamental demands and common attacks, introduces various existing algorithms and analyzes their advantages and disadvantages. The paper also introduces the current state of the techniques and proposes several research topics at next stage.
Keywords:Computer imgae processing  Digital image authentication    Fragile watermarking    Semi  fragile watermarking
本文献已被 CNKI 维普 等数据库收录!
点击此处可从《中国图象图形学报》浏览原始摘要信息
点击此处可从《中国图象图形学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号