Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Software systems and computational methods
Reference:

Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Kutuzov I.M. Generation of digital watermarks in image files

Abstract: the article presents a problem of creating digital watermarks for image files. The authors analyze the main characteristics and requirements to the digital watermarks, introduces a mathematical model of digital watermark generation for “hard” and “soft” stegodetectors. The article analyses the algorithm of message implementation and it proposes the application of the described stego algorithm for solving the problem of copyright check to a specific multimedia file.


Keywords:

Software, digital watermarks, format methods, steganos algorithms of spatial area, steganos algorithms of the field of transformation, multimedia, media space, copyright, copyright protection, inter-format conversation


This article can be downloaded freely in PDF format for reading. Download article

This article written in Russian. You can find original text of the article here .
References
1. Cidorkina I.G., Korobeynikov A.G., Kudrin P.A. Algoritm raspoznavaniya trekh-mernykh izobrazheniy s vysokoy detalizatsiey // Vestnik Mariyskogo gosudarstven-nogo tekhnicheskogo universiteta. – 2010. – ¹ 2 (9). – S. 91–99.
2. Osborne C., van Schyndel R., Tirkel A. A Digital Watermark // IEEE In-tern. Conf. on Image Processing, 1994. P. 86-90.
3. Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology, 1999. 72 p.
4. Simmons G. The prisoner‘s problem and the subliminal channel // Proc. Workshop on Communications Security (Crypto‘83), 1984. P. 51-67.
5. Barsukov V.S. Romantsov A.P. Komp'yuternaya steganografiya: vchera, segodnya, zavtra. Tekhnologii informatsionnoy bezopasnosti XXI veka. – materialy Internet-resursa «Spetsial'naya tekhnika» , ¹ 4, 1998 g. (http://st.ess.ru). Poslednee obrashchenie – 10 ok-tyabrya 2012 g.
6. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Tehniques for data Hiding/ IBM Systems Journal, 35 (3&4): pp. 313-336, 1996.
7. Sklyar B. Tsifrovaya svyaz'. Teoreticheskie osnovy i prakticheskoe primenenie. — Per. s angl. — M.: Izdatel'skiy dom «Vil'yams», 2003. — 1104 s.
8. Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Nesterov S.I. Raz-rabotka steganoalgoritma na baze formatnykh i prostranstvennykh printsipov so-krytiya dannykh//Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekha-niki i optiki – SPb: SPBNIU ITMO, 2012, 1(77)– s.116 – 119.
9. Marr D. Zrenie: informatsionnyy podkhod k izucheniyu predstavleniya i obrabotki zritel'nykh obrazov/ Per. s angl. M.: Radio i svyaz', 1987