Suggestion for an alternative to watermarking and digital signatures
暂无分享,去创建一个
In the following presentation, the case of a preexistent database, containing objects which describe the owner of a multimedia element and image's features, will be examined. A trusted party adds this information to an entry in its database and performs a harsh over the data of the multimedia element. Additional operations will be performed to extract the main features of the multimedia element.
[1] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[2] Christoph Meinel,et al. Constructing a secure HIPACS with structured reporting , 2000, Medical Imaging.
[3] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.