通信学报 ›› 2016, Vol. 37 ›› Issue (11): 137-145.doi: 10.11959/j.issn.1000-436x.2016230

• 学术论文 • 上一篇    下一篇

基于语义特征的电子海图权限水印研究

赖明珠1,2,张立国1,冯维淼3,王媛媛4,王勇1,李守政1   

  1. 1 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
    2 哈尔滨理工大学软件学院,黑龙江 哈尔滨 150001
    3 中国科学院信息工程研究所,北京 100093
    4 东北林业大学机电工程学院,黑龙江 哈尔滨 150040
  • 出版日期:2016-11-25 发布日期:2016-11-30
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;黑龙江省博士后基金资助项目;黑龙江省博士后基金资助项目;国家科技支撑计划基金资助项目;哈尔滨工程大学中央高校基金资助项目

Study on authority watermark of the electronic chart based on the semantics characteristics

Ming-zhu LAI1,2,Li-guo ZHANG1,Wei-miao FENG3,Yuan-yuan WANG4,Yong WANG1,Shou-zheng LI1   

  1. 1 College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    2 School of Software, Harbin University of Science and Technology, Harbin 150001, China
    3 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    4 School of Mechatronics Engineering, Northeast Forestry University, Harbin 150040, China
  • Online:2016-11-25 Published:2016-11-30
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;Postdoctoral Foundation of Heilongjiang Province;Postdoctoral Foundation of Heilongjiang Province;The National Key Technology Support Program of China;Central University Fund of HEU

摘要:

为了进一步扩展数字水印功能,提出了权限水印的概念,即水印信息定义用户对载体的具体操作。基于图像特征识别技术,构造基于语义特征的电子海图权限水印,通过对水印信息的解读,拦截和控制对电子海图的访问操作。实验分析表明,该方法能够实现网络环境下的数据分发和操作验证,在防篡改、水印伪造方面具有突出的性能。

关键词: 信息隐藏, 电子海图, 数字水印, 权限控制

Abstract:

In order to expand the function of watermarking technology, a concept of authority watermark, for which, wa-termarks defining the users' specific operations on the digital carriers was proposed. With interception technology on im-ages, the constructed authority watermark based on the semantics characteristics of the watermark images, through the interpretation of the watermarks, accessing behaviors on the electronic chart would be controlled. Experimental results show that, this method can realize safety distribution and operation verification under the network environment, espe-cially with outstanding performance in tamper resistant and forgery.

Key words: information hiding, electronic chart, digital watermarking, authority control

No Suggested Reading articles found!