期刊文献+

用于版权保护的数字水印技术

Digital Watermark Printing Technology for Copyright Protection
下载PDF
导出
摘要 随着全球信息化时代的到来,由于数字媒体所具有的易传播、易复制等特征,使得知识产权得不到有效的保护,这将严重影响该领域的健康发展。因此,版权保护是一个迫切需要解决的问题,数字水印技术在作为版权保护的重要手段得到了广泛的应用,日益成为国际上研究的热点。文章针对这一特点,主要讨论了数字作品版权保护中对数字水印技术的要求,数字水印技术的分类、应用、基本原理以及介绍图像的交易追踪。 With the approaching of global information era, features of digital media's instant copying, and spreading lead to intellectual property' s failure of protection, and eventually will impact sound development in the realm. Therefore, loyalty protection has become a problem that requires urgent solution. Digital watermark printing technology as a critical protecting technique has attained intensive application and increasingly becoming a booming for international research. The essay mainly discussed requirement of digital works' loyalty protection for watermark printing technology, and its classification, application, basic principals and trade tracking of images.
作者 曹国震
出处 《西安航空技术高等专科学校学报》 2008年第5期65-67,共3页 Journal of Xi'an Aerotechnical College
关键词 数字水印 版权保护 图像追踪 Watermark Printing Loyalty Protection Image Tracking
  • 相关文献

参考文献3

二级参考文献15

  • 1[1]Swanson,M.,Kobayashi,M.,and Tewfik,A.Multimedia data embedding and watermarking technologies.Proceedings of the IEEE,1998:86(6),1064~1087.
  • 2[2]Fabien,A.P.,Petitcolas,F.,Ross,J.Anderson and Markus G.Kuhn.Information Hiding-A Survey.Proceedings of the IEEE,1999:87(7),1062~1078.
  • 3[3]Cox,I.J.,Kilian,J.,and Leighton,T.,et al.Secure spread spectrum watermarking for multimedia.IEEE Trans.on Image Processing,1997:6(12),1673~1687.
  • 4[4]Wolfgang,R.B.,and Delp,E.J.Fragile watermarking using the VW2D watermark.Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents,SPIE Vol.3657,San Jose,CA,January 1999.
  • 5[5]Friedman,G.L.The trustworthy digital camera:restoring credibility to the photographic image.IEEE Trans.on Consumer Electronics,Vol.39,November 1993,905~910.
  • 6[6]Smith,J.R.and Comiskey,B.O.Modulation and information hiding in images.Proceedings of First Intern.Workshop on Information Hiding,R.Anderson ed.Lecture notes in Computer Science,Vol.1174,Springer Verlag 1996,207~226.
  • 7[7]Petitcolas,F.,and Anderson,R.Weaknesses of copyright marking systems.Proceedings of the ACM Multimedia and Security Workshop,Bristol,United Kingdom,September 1998,55~62.
  • 8[1]Bender W, Gruhl D, Morimoto N. Techniques for Data Hiding[A]. Proceedings of the SPIE[C]. USA San Jose CA, 1995.
  • 9[2]Katzenbeisser, etc. Information Hiding Techniques for Steganography and Digital Watermarking[M]. London:Artech House, Inc. 2000.
  • 10[3]The Army Image: In Need of Change?. 美国政府报告ADA376361[EB/OL]. http://www. dtic. mil.

共引文献173

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部