多媒体数据的数字水印算法

S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma
{"title":"多媒体数据的数字水印算法","authors":"S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma","doi":"10.1049/PBSE009E_CH5","DOIUrl":null,"url":null,"abstract":"Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Digital watermarking algorithms for multimedia data\",\"authors\":\"S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma\",\"doi\":\"10.1049/PBSE009E_CH5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.\",\"PeriodicalId\":373543,\"journal\":{\"name\":\"Authentication Technologies for Cloud Computing, IoT and Big Data\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Authentication Technologies for Cloud Computing, IoT and Big Data\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/PBSE009E_CH5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Authentication Technologies for Cloud Computing, IoT and Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBSE009E_CH5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,互联网技术的飞速发展使得多媒体应用得到了广泛的应用。然而,由于互联网的开放性,多媒体数据的安全问题备受关注。这些威胁可能发生在非法复制和/或未经授权的多媒体数据操作方面。在过去的几十年里,数字水印被认为是一种很有前途的解决方案,以防止非法操纵和再分发的内容。在水印技术中,水印或标志嵌入到原始图像中。水印可以稍后提取,用于版权保护、所有权验证、内容认证等应用。在这种背景下,水印被广泛地分为两个应用领域,即利用鲁棒水印保护版权和利用脆弱水印方法检测非法内容操纵。还有一种类型的水印,称为半脆弱水印,也很受欢迎。它可以抵御某些攻击,达到保护版权的目的,适用于增强多媒体文档的认证特性。因此,本章的目的是在基本要求或原则以及开发程序的背景下讨论诸如鲁棒、脆弱和半脆弱等水印方法。我们还讨论了这一特定领域的最新技术以及一些可能的研究范围。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Digital watermarking algorithms for multimedia data
Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信