ImageVerifierCode 换一换
格式:DOCX , 页数:11 ,大小:32.54KB ,
资源ID:1755754      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-1755754.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(外文翻译基于数字水印技术的信息隐藏理论研究.docx)为本站会员(b****2)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

外文翻译基于数字水印技术的信息隐藏理论研究.docx

1、外文翻译基于数字水印技术的信息隐藏理论研究外文资料Information Hiding Thieoretic Research Based on Digital Watermark TechnologySchool of Mathematics and Computer Science Ningxia Universit Yinchuan, ChinaAbstract-With rapidly growing interest in ways to hide information, a large number of schemes have been proposed for audio

2、and other multimedia in digital pictures, video, audio and other multimedia objects.In an attempt to overcome this problem, watermarking has been suggested in the literrature as the most effective means for copyright protection and authentication .The main focus of this thesis is the problem of wate

3、rmarking and compression of image due to bandwidth or storage constraints.Keywords: information hiding; digital watermarking; transparency; robustnessI. IntroductionDue to the rapidly development of the Interest and the World-Wide-Web(WWW),distribution of digital multimedia data to a large populatio

4、n of users can be done very easily.Moreover,digital data can be duplicated very fast and without any degration in quality-cinsider,for example,how common the copying of musical CDs has become in the last few years.Naturally,this situation has raised many concerns about possible violations of intelle

5、ctual property rights.Unauthorized duplication and distribution of copyrighted material(photographs,music,movies,etc.),without appropriate compensation to the copyright holders,are becoming increasingly problemtic.In order to fight piracy,many companies(especially in the entertainment and news indus

6、tries)have devoted considerable attention to the development of information hiding (or watermarking)techniques.In plain terms,a watermark is a signal which is hiden inside some multimedia data,and carries information about this data(e.g.,owner,title,data of creation,ect).Thus a watermark uniquely id

7、entifies the work being protected,and helps resolve disputes about the ownership of the data.There have been many instances of disputes or litigations on the intellectual ownership of multimedia data.A copyright violations lawsuit that received extensive publicity in the early 2000s,was that against

8、 Napster.And the Digital Video Disk,also known as Digital Versatile Disk(DVD)consortium called for proposals for a copyright marking scheme to enforce serial copy management.The idea is that the DVD players sold to consumers will allow unlimited copying of home videos and time-shifted viewing of TV

9、programmers,but cannot easily be abused for commercial priacy.Electronic copyright management schemes have also been proposed by European projects such as Imprimatur and CITED,and American projects such as the proposed by the Working Group on Intellectual Property Rights.Due to its significance,the

10、watermarking field has grown tremendously in the information hiding theoretic.There are numerous articles(the references therein)and books that explain the basic of watermarking,explore its many practical application,and evaluate the performance of various schemes under a variety of attacks.II. Digi

11、tal Watermarking SystemA. WatermarkingIn the communication model for watermarking,the watermark embedder plays the role of the transmitter,the watermark detector plays the role of reciever and the attack represents the communication channel(Fig.1).The objective is to decode the hidden message reliab

12、ly;the original image can be construed of as side information which is always available at the encoder,but is only available at the decoder in the private scenario(not the public one).In this paper, a transmitter sends a signal Xn to a receive (with n transmissions), through the following channel: Y

13、=Xn+Sn+Zn, where Sn, Zn are independent, i.i.d.Gaussian random vectors.Here, Sn is known to the encoder, while Zn acts as noise known to neither encoder or decoder.It is proved that the capacity of this channel is the same as if Sn were known to the decoderas well.In general,this number grows linear

14、ly with the image size,and the constant of proportionality is known as the capacity C.Practical watermarking implementation embed at a rate R bits/image dimension,where RC.Namely,C=1/2 log(1+P/N),where P is the average(per symbol)power of Xn and N is average of Zn.This result is quite surprising bec

15、ause one would expect Sn to act as inteference at the receiver,thus hidering the detection scenario,Sn would play the role of the covertext(known to the watermark embedder only),Xn would represent the watermark embedded, and Zn would be the noise added by the attacker.B. Characteristics of watermark

16、ingIn the design of watermarking schemes,we mainly think about two key requirements.Transparency: The hidden message should not interfere perceptually with the host signal.This requirement is perfectly justified by the fact that watermarking aims at protecting multimedia data,which are sensitive,in

17、general,to changes.In other words,an image or a musical piece could become useless if the introduced artifacts(due to watermarking)exceeded some perceptual threshold.The quality of the watermarked data must thus be comparable to that of the covertext,a requirement which is often expressed in terms o

18、f a distorition constraint.Robustness: The message must be detectable in the watermarked image(the covertext is assumed to be an image throughout this thesis,though similar techniques can be applied to other types of multimedia data),even after degradation duo to malicious attacks or other processin

19、g(quantization,D/A conversion,etc).Of course,detectability of the watermark is closely related to the maxinum amount of distortion that can be introduced by an attacker.A watermarking scheme is robust if it allows the hidden message to be accurately decoded in a distorted image whose quality is clos

20、e to that of the watermarked image(this requriement is again expressed in terms of a distortion constraint).C. Detection scenariosThere are two decetion scenarios:private and public.In the private decetion scenario,the original image is available to the decetor,in the public scenario,it is not.Altho

21、ugh public detection scheme can be more useful in practice(since it is not always possible to have the original image availableduring the decetion),private schemes usually offer more robustness.III. Watermarking Rates In The Presence Of Memoryless Attacks And Gaussian AttacksWe choose that the memor

22、yless attack is fixed (in terms of the conditional probability distribution of the attack channel), for both discrete and continuous alphabets.We establised the region achievable rates (Rq, Rw) under memoryless attacks.A. Discrete Alphabets.The general form of the watermarking system under considera

23、tion is shown in Fig.2.The watermark index W is uniformly distributed over a set of size 2nRw; Yn is the watermarked image which can be found in a source codebook of size 2nRw, the attack channel is memoryless.The watermark decode outputs W.We consider a private scenario here,so we assume that In is

24、 known at the decoder.A.Attacking ProcedureThe watermarker (who designs the encoder pair) tries to maximize the achievable rate region while the attacker tries to minimize it 12.The procedure of attack are expressed as follows:1. The encoder (watermark embedder) is designed without any knowledge of

25、the attack conditional distribution p.Firstly; the watermark designs an encoding function f. The watermark must ensure that the rates are chosen such that the watermark is detected reliably for any attackd diatribution p chosen by the attacker.2. The attack, who knows k, plays second and chooses a c

26、onditional distribution p for the attack such that the distortion constraint is met.3. The watermark plays next, and designs his watermark decoding algorithm g with respect to the distribution p chosen by the attacker.IV. ConclutionIn this paper, we established the region of achievable rates under m

27、emory attacks.The paper is discussed the following case: 1. The memoryless attack is chosen independently of the embedding strategy and is known to both encoder and decoder.Results are obtained for two statistical models:the general discrete alphabet case for arbitrary image distributions and distor

28、tion constraints,as well as the Gaussian case where the original image and the attack channel are i.i.d.Gaussian,and the distortion metric is quadratic. 2. The information and the attacker play a game which is the attacking procedure. Specifically, the attacker knows the encoding function used by th

29、e watermarker, while the decoder knows the attack distribution. Finally, there are a number of direction for future research.All results derived in this thesis assume a private scenario.We were not able to astablised the region of achievable rates in a public scenario, even for the simple Gaussian c

30、ase.Futhermore, it would be interesting to establish rate regions for joint watermarking and compression systems under distortion constraints that do not involve averaging of distortion measures.中文翻译基于数字水印技术的信息隐藏理论研究宋丽娟 (宁夏大学 数学与计算机科学,银川 中国,slj)摘要:随着信息隐藏技术的迅速发展,水印和其它一些在数码照片、视频、音频以及其它的多媒体设备等信息方面相继也提出

31、了很多方案。为了解决版权保护盒认证的相关问题,有人提出了使用水印作为最有效的手段。鉴于带宽的限制和压缩存储的问题,本文的重点是研究水印和压缩方面的问题。关键字:信息隐藏;数字水印;透明度;鲁棒性I. 引言 由于互联网和计算机的迅速发展,数字多媒体迅速发展到数据同时共享于众多用户是很容易实现的。此外,数据可以被快速复试而不产生任何质量损耗。例如,最近几年里,音乐和唱片的拷贝变得非常普遍。理所当然,这种情形唤起了人们对知识产权侵害的关注。没有给予版权持有人适当的补偿,而进行未经许可的复制以及传播享有著作权的材料(照片,音乐,电影等),正变得越来越严重。为了打击盗版,许多公司(尤其是娱乐和新闻行业)

32、相当重视信息隐藏(或数字水印)技术的发展。简单来说,水印作为一种信号隐藏技术在一些多媒体数据中,并携带有关数据(例如,所有者、标题、制作日期等)的信息。因此,水印就能唯一的标记受保护的作品,帮助解决有关数据所有权的纷争的问。 有很多的关于多媒体知识产权的纠纷或所有权的诉讼案件方面的例子。在2000年初一,关于Napster软件版权侵犯的诉讼案得到了普遍关注。数字视频光盘协会(即数字通用光盘协会)号召提出一些版权保护措施来加强资源的管理。该想法是,卖给消费者的DVD播放器将允许不受权限的复制家庭录影以及观看的是移电视节目,不能轻易将此行为定位商业侵权。像Imprimature和CITED的欧洲项目和Working Group 提议的关于知识产权的美国项目都提到了电子版权的管理。 由于其重要性,水印领域有了大量关于信息隐藏技术的研究。有很多文章(其中的参考文献)和书籍都解释了数字水印的基本知识,探索了它的许多实际应用,并评估在各种攻击下的性能。II. 数字水印系统A. 水印在水印的通信模型中,水印嵌入扮演的是发射机,水印检测器扮演的是接收机。攻击代表通信系统信道(图1)。目标是可靠检测出隐藏信息;原始图像可以被理解为一直用于编码器的隐藏信息。但是,仅仅是在隐藏(不公开)的情况下解码器可用。在本文中,发射机发出了一个信号Xn到一个接收

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2