哪位英语高手能帮我翻译下面这段英文,不要机器翻译的,谢!!给分!!
Ageneralizedblockdiagramthatisrepresentativeofthepriorlosslessauthenticationwatermark...
A generalized block diagram that is representative of the prior lossless authentication watermarking schemes is seen in Fig. 1. In these methods, the watermark embedding phase has two stages: a) an authentication-information (e.g., digital signature) computation step; and b) a lossless (reversible) data embedding step, in which the computed information is inserted into the image data in a reversible manner. During the recovery and verification phase, first the data embedding process is reversed to yield an estimate for the original image and the authentication information. If the watermarked image has not been altered, the extracted information validates the estimated image and this estimate is labeled as an authentic original.
Virtually all existing schemes [9]–[14] follow this framework with differences in the lossless data embedding step. In [9], Fridrich et al. implemented the lossless data embedding step by compression and replacement of one or more least-signifi- cant bit planes of the image data. Later, the authors proposed a more efficient algorithm based on RS-embedding method [13]. Meanwhile, Honsinger et al. [10] proposed using a spread-spec- trum watermark with modulo-addition for lossless reconstruc- tion. Similarly, De Vleeschouwer et al., Tian and van der Veen have proposed methods based on the circular interpretation of the image histogram [14], difference expansion [11], and his- togram modifications [15], respectively.
In [16], Dittmann et al. proposed an alternative protocol based on the least significant bit (LSB) compression technique of [9]. The protocol utilizes a public and a private key signature corre- sponding to the most and least significant bit planes, respectively. When combined with the encryption of the compressed LSB information, the method allows for public-key verification of the watermarked image while reserving the reconstruction of the perfect original to the authorized parties that hold the private-key. Despite the added functionality, the protocol is not extensible to all lossless embedding methods, for instance Honsinger’s method [10]. Furthermore, it requires an increased payload, thus a higher embedding distortion, due to the second signa- ture. Note that none of the lossless authentication methods in the literature offer tamper localization capability, which is one of the major advantages of authentication watermarks over con- ventional digital signatures 展开
Virtually all existing schemes [9]–[14] follow this framework with differences in the lossless data embedding step. In [9], Fridrich et al. implemented the lossless data embedding step by compression and replacement of one or more least-signifi- cant bit planes of the image data. Later, the authors proposed a more efficient algorithm based on RS-embedding method [13]. Meanwhile, Honsinger et al. [10] proposed using a spread-spec- trum watermark with modulo-addition for lossless reconstruc- tion. Similarly, De Vleeschouwer et al., Tian and van der Veen have proposed methods based on the circular interpretation of the image histogram [14], difference expansion [11], and his- togram modifications [15], respectively.
In [16], Dittmann et al. proposed an alternative protocol based on the least significant bit (LSB) compression technique of [9]. The protocol utilizes a public and a private key signature corre- sponding to the most and least significant bit planes, respectively. When combined with the encryption of the compressed LSB information, the method allows for public-key verification of the watermarked image while reserving the reconstruction of the perfect original to the authorized parties that hold the private-key. Despite the added functionality, the protocol is not extensible to all lossless embedding methods, for instance Honsinger’s method [10]. Furthermore, it requires an increased payload, thus a higher embedding distortion, due to the second signa- ture. Note that none of the lossless authentication methods in the literature offer tamper localization capability, which is one of the major advantages of authentication watermarks over con- ventional digital signatures 展开
3个回答
展开全部
广义框图,具有代表性的认证水印方案之前看到无损于图1。在这些方法中,水印嵌入阶段两个阶段:authentication-information(例如,数字签名)的计算步骤,b)无损(可逆)嵌入的步骤,在计算信息嵌入图像数据的方式,是可逆的。在恢复和验证阶段,首先嵌入过程是颠倒的屈服估计为原始图像和认证的信息。如果水印图像的未被修改过的信息,并提取的图像,这个估计大约为一个真实的正本。
几乎所有现存的方案[9],[14]跟这个框架的差异无损嵌入的步骤。在[9],Fridrich等实现了数字水印信息嵌入图片压缩和更换逐步由一个或多个least-signifi -不能咬飞机的图像数据。后来,作者提出了一个更有效率演算法的基础上RS-embedding方法[13]。同时,Honsinger缪群。[10]提议使用一spread-spec水印和modulo-addition -吹reconstruc为无损。-同样,德Vleeschouwer等,并提出了基于分梳圆形图像的直方图解释[14]、[11],不同扩张和他togram修改(15),分别。
在[16],Dittmann等提出另一种协议基于最低位(LSB)压缩技术[9]。这个协议利用公共和私人钥签章相应- sponding最和最低位飞机。当结合加密的方法,压缩LSB信息公开密钥验证,允许水印图像而保留的重构原始授权各方完美的私钥保存。尽管附加功能,协议的所有图片不是可嵌入方法,比如Honsinger[10]的方法。再者,它需要增加,因此较高载荷嵌入失真,由于第二次信号——真正的。注意,所有的无损鉴定方法在文学作品篡改定位能力,提供的一个主要优势是对的——ventional欺诈认证水印数字签名
几乎所有现存的方案[9],[14]跟这个框架的差异无损嵌入的步骤。在[9],Fridrich等实现了数字水印信息嵌入图片压缩和更换逐步由一个或多个least-signifi -不能咬飞机的图像数据。后来,作者提出了一个更有效率演算法的基础上RS-embedding方法[13]。同时,Honsinger缪群。[10]提议使用一spread-spec水印和modulo-addition -吹reconstruc为无损。-同样,德Vleeschouwer等,并提出了基于分梳圆形图像的直方图解释[14]、[11],不同扩张和他togram修改(15),分别。
在[16],Dittmann等提出另一种协议基于最低位(LSB)压缩技术[9]。这个协议利用公共和私人钥签章相应- sponding最和最低位飞机。当结合加密的方法,压缩LSB信息公开密钥验证,允许水印图像而保留的重构原始授权各方完美的私钥保存。尽管附加功能,协议的所有图片不是可嵌入方法,比如Honsinger[10]的方法。再者,它需要增加,因此较高载荷嵌入失真,由于第二次信号——真正的。注意,所有的无损鉴定方法在文学作品篡改定位能力,提供的一个主要优势是对的——ventional欺诈认证水印数字签名
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询