高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

数字水印的信道容量研究综述

王颖 李象霖

王颖, 李象霖. 数字水印的信道容量研究综述[J]. 电子与信息学报, 2006, 28(5): 955-960.
引用本文: 王颖, 李象霖. 数字水印的信道容量研究综述[J]. 电子与信息学报, 2006, 28(5): 955-960.
Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.
Citation: Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.

数字水印的信道容量研究综述

An Overview of the Capacity of Digital Watermarking

  • 摘要: 该文对数字水印信道容量的研究结果进行了分析总结。文中介绍了作为基本通信系统的水印、作为边信息的水印、利用脏纸编码的水印及安全水印的信道容量。通过对水印信道容量的分析,得出了对水印的嵌入和检测算法研究具有指导意义的结论。
  • Cox I J, Miller M L, Bloom J M. Digital Watermarking. United States of America, Mordan Kaufmann Publishers, 2002, chapter 1-2.[2]Perez-Gonzalea F, Hernandes J R, Balado F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001, 81(6): 1215-1238.[3]Su J K, Eggers J J, Girod B. Capacity of digital watermarks subjected to an optimal collusion attack. European Signal Processing Conference(EUSIPCO), Tampere, Finland, September 2000.[4]Eggers J J, Bauml R R, Girod B. Digital watermarking facing attacks by amplitude scaling and additive white noise. 4th Intl. ITG Conference on Source and Channel Coding, Berlin, Jan. 2002: 28-30.[5]Moulin P, OSullivan J A. Information-Theoretic Analysis of Information Hiding[J].IEEE Trans. on Information Theory.2003, 49(3):563-593[6]Moulin P, OSullivan J A. Information-theoretic analysis of watermarking. in Proceedings of the International Conference on Acoustics, Speech, and Signal processing, 2000, 6: 3630-3633.[7]OSullivan J A, Moulin P, Ettinger J M. Information-theoretic analysis of steganography. Proceedings of the IEEE International Symposium on Information Theory, Boston, Aug. 1998.[8]Eggers J J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, San Jose, Ca., Jan., 2002.[9]Cachin C. An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998: 306-318.[10]傅祖芸. 信息论基础理论及应用. 北京: 电子工业出版社,2001: 90-111.[11]Cox I J, Kilian J, Leightom T, Shamoon T. Secure spread spectrum watermarking for multimedia[J].IEEE Trans. on Image Processing.1997, 6(12):1673-1687[12]Cox I J, Miller M L, McKellips A. Watermarking as communications with side information[J].Proceedings of the IEEE.1999, 87(7):1127-1141[13]Chen B, Wornell G W. Achievable performance of digital watermarking systems. In Proceeding of the IEEE Intl. Conference on Multimedia Computing and Systems (ICMCS'99),[14]Florence, Italy, July 1999, 1: 13-18.[15]Gelfand S I, Pinsker M S. Coding for channel with random[16]Parameters. Problems of Control and Information Theory, 1980,[17]1): 19-31.[18]Costa M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-441[19]Chen B, Wornell G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[J].IEEE Trans. on Information Theory.2001, 47(4):1423-1443[20]Su J K, Eggers J J, Girod B. Andysis of digital watermarks subjected to optimum linear filtering and additive noise[J].Signal Processing.2001, 81(6):1141-1175[21]Chen B, Wornell G W. Dither modulation: a new approach to digital watermarking and information embedding. In Proceeding of SPIE Vol. 3675. Security and Watermarking of Multimedia Contents, San Jose, January 1999.[22]Chen B, Wornell G. Proprocessed and postprocessed quantization index modulation methods for digital watermarking. In Proceeding of SPIE Vol.3971; Security and Watermarking of Multimedia Contents Ⅱ, San Jose, January 2000. [20] Ramkumar M. Data hiding in multimedia: theory and application. Ph. D thesis, New Jersey Institute of Technology, Kearny, NJ, USA, 1999.[23]Moulin P, Mihgak M K. The parallel-gaussian watermarking game. UIUC Technique Report UIUC-ENG-01-2214, June 2001.Moulin P, Ivanovic A. The watermark selection game. Proceeding Conference on Information Sciences and Systems, Baltimore, MD, March 2001.
  • 加载中
计量
  • 文章访问数:  2597
  • HTML全文浏览量:  95
  • PDF下载量:  1177
  • 被引次数: 0
出版历程
  • 收稿日期:  2004-12-07
  • 修回日期:  2005-05-08
  • 刊出日期:  2006-05-19

目录

    /

    返回文章
    返回