一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

數(shù)字水印的信道容量研究綜述

王穎 李象霖

王穎, 李象霖. 數(shù)字水印的信道容量研究綜述[J]. 電子與信息學報, 2006, 28(5): 955-960.
引用本文: 王穎, 李象霖. 數(shù)字水印的信道容量研究綜述[J]. 電子與信息學報, 2006, 28(5): 955-960.
Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.
Citation: Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.

數(shù)字水印的信道容量研究綜述

An Overview of the Capacity of Digital Watermarking

  • 摘要: 該文對數(shù)字水印信道容量的研究結果進行了分析總結。文中介紹了作為基本通信系統(tǒng)的水印、作為邊信息的水印、利用臟紙編碼的水印及安全水印的信道容量。通過對水印信道容量的分析,得出了對水印的嵌入和檢測算法研究具有指導意義的結論。
  • Cox I J, Miller M L, Bloom J M. Digital Watermarking. United States of America, Mordan Kaufmann Publishers, 2002, chapter 1-2.[2]Perez-Gonzalea F, Hernandes J R, Balado F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001, 81(6): 1215-1238.[3]Su J K, Eggers J J, Girod B. Capacity of digital watermarks subjected to an optimal collusion attack. European Signal Processing Conference(EUSIPCO), Tampere, Finland, September 2000.[4]Eggers J J, Bauml R R, Girod B. Digital watermarking facing attacks by amplitude scaling and additive white noise. 4th Intl. ITG Conference on Source and Channel Coding, Berlin, Jan. 2002: 28-30.[5]Moulin P, OSullivan J A. Information-Theoretic Analysis of Information Hiding[J].IEEE Trans. on Information Theory.2003, 49(3):563-593[6]Moulin P, OSullivan J A. Information-theoretic analysis of watermarking. in Proceedings of the International Conference on Acoustics, Speech, and Signal processing, 2000, 6: 3630-3633.[7]OSullivan J A, Moulin P, Ettinger J M. Information-theoretic analysis of steganography. Proceedings of the IEEE International Symposium on Information Theory, Boston, Aug. 1998.[8]Eggers J J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, San Jose, Ca., Jan., 2002.[9]Cachin C. An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998: 306-318.[10]傅祖蕓. 信息論基礎理論及應用. 北京: 電子工業(yè)出版社,2001: 90-111.[11]Cox I J, Kilian J, Leightom T, Shamoon T. Secure spread spectrum watermarking for multimedia[J].IEEE Trans. on Image Processing.1997, 6(12):1673-1687[12]Cox I J, Miller M L, McKellips A. Watermarking as communications with side information[J].Proceedings of the IEEE.1999, 87(7):1127-1141[13]Chen B, Wornell G W. Achievable performance of digital watermarking systems. In Proceeding of the IEEE Intl. Conference on Multimedia Computing and Systems (ICMCS'99),[14]Florence, Italy, July 1999, 1: 13-18.[15]Gelfand S I, Pinsker M S. Coding for channel with random[16]Parameters. Problems of Control and Information Theory, 1980,[17]1): 19-31.[18]Costa M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-441[19]Chen B, Wornell G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[J].IEEE Trans. on Information Theory.2001, 47(4):1423-1443[20]Su J K, Eggers J J, Girod B. Andysis of digital watermarks subjected to optimum linear filtering and additive noise[J].Signal Processing.2001, 81(6):1141-1175[21]Chen B, Wornell G W. Dither modulation: a new approach to digital watermarking and information embedding. In Proceeding of SPIE Vol. 3675. Security and Watermarking of Multimedia Contents, San Jose, January 1999.[22]Chen B, Wornell G. Proprocessed and postprocessed quantization index modulation methods for digital watermarking. In Proceeding of SPIE Vol.3971; Security and Watermarking of Multimedia Contents Ⅱ, San Jose, January 2000. [20] Ramkumar M. Data hiding in multimedia: theory and application. Ph. D thesis, New Jersey Institute of Technology, Kearny, NJ, USA, 1999.[23]Moulin P, Mihgak M K. The parallel-gaussian watermarking game. UIUC Technique Report UIUC-ENG-01-2214, June 2001.Moulin P, Ivanovic A. The watermark selection game. Proceeding Conference on Information Sciences and Systems, Baltimore, MD, March 2001.
  • 加載中
計量
  • 文章訪問數(shù):  2612
  • HTML全文瀏覽量:  100
  • PDF下載量:  1177
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2004-12-07
  • 修回日期:  2005-05-08
  • 刊出日期:  2006-05-19

目錄

    /

    返回文章
    返回