|
Software systems and computational methods
Reference:
Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Kutuzov I.M.
Generation of digital watermarks in image files
// Software systems and computational methods.
2013. ¹ 1.
P. 35-44.
URL: https://en.nbpublish.com/library_read_article.php?id=62447
Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Kutuzov I.M. Generation of digital watermarks in image files
Abstract:
the article presents a problem of creating digital watermarks for image files. The authors
analyze the main characteristics and requirements to the digital watermarks, introduces a mathematical model of digital watermark generation for “hard” and “soft” stegodetectors. The
article analyses the algorithm of message implementation and it proposes the application of the
described stego algorithm for solving the problem of copyright check to a specific multimedia file.
Keywords:
Software, digital watermarks, format methods, steganos algorithms of spatial area, steganos algorithms of the field of transformation, multimedia, media space, copyright, copyright protection, inter-format conversation
This article can be downloaded freely in PDF format for reading. Download article
References
1. Cidorkina I.G., Korobeynikov A.G., Kudrin P.A. Algoritm raspoznavaniya trekh-mernykh izobrazheniy s vysokoy detalizatsiey // Vestnik Mariyskogo gosudarstven-nogo tekhnicheskogo universiteta. – 2010. – ¹ 2 (9). – S. 91–99.
2. Osborne C., van Schyndel R., Tirkel A. A Digital Watermark // IEEE In-tern. Conf. on Image Processing, 1994. P. 86-90.
3. Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology, 1999. 72 p.
4. Simmons G. The prisoner‘s problem and the subliminal channel // Proc. Workshop on Communications Security (Crypto‘83), 1984. P. 51-67.
5. Barsukov V.S. Romantsov A.P. Komp'yuternaya steganografiya: vchera, segodnya, zavtra. Tekhnologii informatsionnoy bezopasnosti XXI veka. – materialy Internet-resursa «Spetsial'naya tekhnika» , ¹ 4, 1998 g. (http://st.ess.ru). Poslednee obrashchenie – 10 ok-tyabrya 2012 g.
6. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Tehniques for data Hiding/ IBM Systems Journal, 35 (3&4): pp. 313-336, 1996.
7. Sklyar B. Tsifrovaya svyaz'. Teoreticheskie osnovy i prakticheskoe primenenie. — Per. s angl. — M.: Izdatel'skiy dom «Vil'yams», 2003. — 1104 s.
8. Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Nesterov S.I. Raz-rabotka steganoalgoritma na baze formatnykh i prostranstvennykh printsipov so-krytiya dannykh//Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekha-niki i optiki – SPb: SPBNIU ITMO, 2012, 1(77)– s.116 – 119.
9. Marr D. Zrenie: informatsionnyy podkhod k izucheniyu predstavleniya i obrabotki zritel'nykh obrazov/ Per. s angl. M.: Radio i svyaz', 1987
|