首页 | 本学科首页   官方微博 | 高级检索  
     

基于脆弱性数字水印的图象完整性验证研究
引用本文:宋玉杰,谭铁牛. 基于脆弱性数字水印的图象完整性验证研究[J]. 中国图象图形学报, 2003, 8(1): 1-7
作者姓名:宋玉杰  谭铁牛
作者单位:中国科学院自动化所,中国科学院自动化所 模式识别国家重点实验室,北京100080,模式识别国家重点实验室,北京100080
基金项目:国家杰出青年基金 (5 982 5 10 5 )
摘    要:计算机网络技术的飞速发展与信息媒体的数字化 ,使得在网络环境中对数字产品实施有效的内容保护成为一个迫在眉睫的现实问题 .传统的数字签名技术只是用于对通信领域的信息传送进行篡改检测 ,而脆弱性数字水印技术则为网络环境下多媒体的内容保护提供了一个有效的解决方案 .与鲁棒性水印不同的是 ,脆弱性水印主要用于检测发生在多媒体数据中的篡改 ,并对其定位 .为了推动我国在此前沿领域研究工作的进一步深入 ,这里就当前脆弱性数字图象图象水印技术的基本特征、一般原理、研究现状、攻击方法及发展方向进行一个综述 .

关 键 词:脆弱性数字水印  真伪鉴别
文章编号:1006-8961(2003)01-0001-07
修稿时间:2001-09-24

A Brief Review on Fragile Watermarking Based Image Authentication
SONG Yu-jie and TAN Tie-niu. A Brief Review on Fragile Watermarking Based Image Authentication[J]. Journal of Image and Graphics, 2003, 8(1): 1-7
Authors:SONG Yu-jie and TAN Tie-niu
Abstract:Effective multimedia authentication is an increasing important issue in a networked environment. Fragile digital watermark thus come into being. Unlike traditional digital signature which is bounded with the content, fragile watermarking works effectively for multimedia content authentication by embedding a watermark(such as identification data, serials number, text or image etc.) to multimedia documents without influencing the vision or hearing effect of multimedia. Fragile digital watermarking is of great importance in courtroom defence, reliable e-business, medical image databases, etc. When the conetent of multimedia is suspected, the extraction of fragile watermark can be used to detect and localize tampers, even present the category of tampering. To motivate the relative research in this field, we attempt to give a brief overview of fragile digital watermarking into the context of image authentication in this paper.The basic characteristics of fragile watermarking is first outlined.Then comes the discussion of current algorithms, which not only includes basic schemes--spatial domain based algorithms and transform domain based methods, but also sums up the four typical types of fragile watermarking with different applications. Possible attacks and future research topics come in the following and future direction is outlined in the end.There still need a long way for fragile digital watermarking to go into standilization and actual applications.
Keywords:Fragile watermarks   Image authentication
本文献已被 CNKI 等数据库收录!
点击此处可从《中国图象图形学报》浏览原始摘要信息
点击此处可从《中国图象图形学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号