Advanced Search
Volume 23 Issue 9
Sep.  2001
Turn off MathJax
Article Contents
Mao Qiong, Chen Mingqi, Xia Guangsheng, Yang Yixian, Tan Tieniu. THE RESEARCH OF SECURE DIGITAL WATERMARKING ARCHITECTURE[J]. Journal of Electronics & Information Technology, 2001, 23(9): 833-840.
Citation: Mao Qiong, Chen Mingqi, Xia Guangsheng, Yang Yixian, Tan Tieniu. THE RESEARCH OF SECURE DIGITAL WATERMARKING ARCHITECTURE[J]. Journal of Electronics & Information Technology, 2001, 23(9): 833-840.

THE RESEARCH OF SECURE DIGITAL WATERMARKING ARCHITECTURE

  • Received Date: 1999-11-01
  • Rev Recd Date: 2000-03-28
  • Publish Date: 2001-09-19
  • Watermarking, as a new technique mainly used for IPR protection and authentication, has become a research hotspot not long after its appearance. Many effective watermarking algorithms have been proposed. But the mature of watermark technology is not enough for IPR, protection. Confronted with current various attack method, a secure watermarking architecture must be built to standardize the whole process,, from watermark insertion to detection. The AQUARELLE system is a good example for showing how IMPRIMATU--an architecture for IPR, protection is operated. The secure flaws of IMPRIMATUR and AQUARELLE system wa- terinarking protocol will also be pointed out. Further, a new secure watermarking architecture will be proposed. Its effectiveness will make up for the flaws mentioned above.
  • loading
  • E. Koch, J. Zhao, Towards robust and hidden image copyright labeling, Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Halkidiki, Greece, June 20-22, 1995, 452-455.[2]I.J. Cox.[J].J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum waterm arking for images audio and video, IEEE Proc. Int. Conf. Image Processing(ICIP96), Lausanne, Switzerland.Vol. III.1996,:-[3]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, 6(12), 1673 1687.[4]L.F. Turner L F, Digital data security system, Patent IPN WO89/08915, 1989.[5]R.G. Schyndel, A. T. Tirkel, C. F. Osborne, A digital watermark, Int. Conf. on Image Processing,Vol.2, 1994, 86 90. [6]Scott Craver, Nasir Memon, Boon-Lock Yeo, Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications, IEEE J. on Selected Areas in Communications, 1998, 16(4), 573 586.[6]Daniel Augot, Jean-Marc. Jean-Francois, Secure delivery of image over open networks, Proc.IEEE, 1999, 87(7), 1251-1266.[7]Keith Hill, A Perspective: The role of identifiers in managing and protecting intellectual property in the digital age, Proc. IEEE, 1999, 87(7), 1228 1238.[8]W. Diffie, M. W. Hellmann, New directions in cryptography, IEEE Trans. on Info. Theory, 1976,IT-22(5), 644-645.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2136) PDF downloads(489) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return