메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
김혜진 (부산외국어대학교) 백남균 (덕성여자대학교)
저널정보
아태인문사회융합기술교류학회 아시아태평양융합연구교류논문지 아시아태평양융합연구교류논문지 제9권 제4호
발행연도
2023.4
수록면
1 - 15 (15page)
DOI
http://dx.doi.org/10.47116/apjcri.2023.04.01

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
Researchers in the fields of information security and computer image processing are deeply concerned about digital watermarking technology as piracy of digital products like images, audio, video, and files, which are becoming increasingly serious due to the Internet's rapid development and the media resources' digitalization. By detecting the watermark information embedded in the digital media to identify the media copyright, the copyright of the digital media can be effectively protected. In fact, digital watermarking has important application value in covert communication, bill anti-counterfeiting, digital signature, fingerprint identification, logo implicit authentication, and so on. In this paper, an algorithm- and algorithm-combination-based dual digital watermarking design technique is proposed. Based on a careful examination of the algorithms and algorithms one at a time, this creative proposal combines the two algorithms to achieve efficient embedding and extraction of digital watermarks and to take advantage of the double watermark's security benefits to encrypt the transmission of digital maps, thereby enhancing the security of image transmission. Then, the scheme is tested to prove its feasibility. At the same time, in order to verify the advantages of the scheme, a variety of attack experiments are carried out on the scheme, and the experimental data in the same environment are compared with other dual digital watermarking schemes. Finally, the superiority and robustness of the scheme are obtained, and it is applied and popularized in the military. The emphasis of this paper is to realize the information security of armored mechanized troops. During the battle, armored mechanized units use the positioning system equipped by armored vehicles to snap the geographical environment of the battlefield instantly, and upload the image to the rear combat command center in time through the network, military network, and people's network. In this long-distance transmission process, in order to ensure the security and timeliness of the transmitted images, it is necessary to use encryption technology to protect and verify the military images.

목차

등록된 정보가 없습니다.

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0