'Generation of digital watermarks in image files' Software systems and computational methods nbpublish.com
Eng During last 365 days Approved articles: 1630,   Articles in work: 213 Declined articles: 281 
Library
Your profile

Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Kutuzov I.M. Generation of digital watermarks in image files

Published in journal "Software systems and computational methods", 2013-1 , pages 35-44.

Resume: the article presents a problem of creating digital watermarks for image files. The authors analyze the main characteristics and requirements to the digital watermarks, introduces a mathematical model of digital watermark generation for hard and soft stegodetectors. The article analyses the algorithm of message implementation and it proposes the application of the described stego algorithm for solving the problem of copyright check to a specific multimedia file.

Keywords: Software, digital watermarks, format methods, steganos algorithms of spatial area, steganos algorithms of the field of transformation, multimedia, media space, copyright, copyright protection, inter-format conversation

DOI: 10.7256/2305-6061.2013.01.3

This article can be downloaded freely in PDF format for reading. Download article

Bibliography:
1. Cidorkina I.G., Korobeynikov A.G., Kudrin P.A. Algoritm raspoznavaniya trekh-
mernykh izobrazheniy s vysokoy detalizatsiey // Vestnik Mariyskogo gosudarstven-
nogo tekhnicheskogo universiteta. 2010. 2 (9). S. 9199.
2. Osborne C., van Schyndel R., Tirkel A. A Digital Watermark // IEEE In-tern. Conf. on Image
Processing, 1994. P. 86-90.
3. Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology,
1999. 72 p.
4. Simmons G. The prisoners problem and the subliminal channel // Proc. Workshop on
Communications Security (Crypto83), 1984. P. 51-67.
5. Barsukov V.S. Romantsov A.P. Komp'yuternaya steganografiya: vchera, segodnya, zavtra.
Tekhnologii informatsionnoy bezopasnosti XXI veka. materialy Internet-resursa
Spetsial'naya tekhnika , 4, 1998 g. (http://st.ess.ru). Poslednee obrashchenie 10 ok-
tyabrya 2012 g.
6. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Tehniques for data Hiding/ IBM Systems Journal,
35 (3&4): pp. 313-336, 1996.
7. Sklyar B. Tsifrovaya svyaz'. Teoreticheskie osnovy i prakticheskoe primenenie. Per.
s angl. M.: Izdatel'skiy dom Vil'yams, 2003. 1104 s.
8. Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Nesterov S.I. Raz-
rabotka steganoalgoritma na baze formatnykh i prostranstvennykh printsipov so-
krytiya dannykh//Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekha-
niki i optiki SPb: SPBNIU ITMO, 2012, 1(77) s.116 119.
9. Marr D. Zrenie: informatsionnyy podkhod k izucheniyu predstavleniya i obrabotki
zritel'nykh obrazov/ Per. s angl. M.: Radio i svyaz', 1987.

Correct link to this article:
just copy this link to clipboard