期刊文献+

基于光滑支持向量机的图像水印技术 被引量:2

Image watermark scheme based on smooth support vector machine
下载PDF
导出
摘要 一些基于标准支持向量机的图像水印技术,使图像水印的效果得到一定改善,但降低了图像水印技术的效率。针对这个问题,用光滑支持向量机取代标准支持向量机,结合图像的局部相关特性来确定图像的最佳嵌入位置和嵌入强度,提出一种基于光滑支持向量机的图像水印技术,并做了仿真实验。实验表明,这种技术与以往基于标准支持向量机的图像水印技术相比,不仅效果更优,而且效率也显著提高。 Using a class of new smoothing functions, the problem of smooth support vector machine (SVM) was studied. A new model of SVM, 3rd-order polynomial smooth support vector machine (3SSVM), was proposed, and its global convergence was established. Numerical experiments were carried out to evaluate 3SSVM, using Newton-Armijo algorithm. The results show that 3SSVM is better than PSSVM and SSVM in the classification performance and computational speed. A better theoretical support is provided for applications of smooth support vector machine.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第6期2075-2078,2194,共5页 Computer Engineering and Design
基金 广东省科技计划基金项目(2009B010800054) 东莞市科技计划基金项目(2012108102027)
关键词 光滑支持向量机 标准支持向量机 图像水印 人眼视觉系统 图像局部相关性 smooth support vector machine standard support vector machine image watermarking human visual system (HVS) image local correlation
  • 引文网络
  • 相关文献

参考文献7

二级参考文献57

共引文献53

同被引文献22

  • 1Navas K A,Sreevidya S,Sasikumar M.A benchmark for medical image watermarking[C]//Maribor:14th International Workshop on Systems,Signals & Image Processing and 6th EURASIP Conference,2007:27-30.
  • 2Zhang Jing,Liu Xiaoqian,Wang Jie.A scalable message authentication scheme for JPEG2000 codestreams[C]//IEEE,the 5th International Conference on Computer Science & Education,2010:978-980.
  • 3Hsiao Ju-Yuan,Chan Ke-Fan,Chang J Morris.Block-based reversible data embedding[J].Signal Processing,2009(89):556-569.
  • 4Chang Chin-Chen,Lin Chin-Yang,Fan Yi Hsuan.Lossless data hiding for color images based on block truncation coding[J].Pattern Recognition,2008 (41):2347-2357.
  • 5Hua Yuning,Wang A-na,Wu Bo.An algorithm for image authentication based on fragile watermarking[C]//3rd International Conference on Intelligent Networks and Intelligent Systems,2010:52-54.
  • 6Xie Rongsheng,Wu Keshuo,Zhu Shunzhi.An improved semi-fragile digital watermarking scheme for image authentication[C]//IEEE International Workshop on Anti-counterfeiting,Security,Identification,2007:262-263.
  • 7Phadikar A,Maity SP,Mandal M.QIM data hiding for tamper detection and correction in digital images using wavelet transform[C]//23rd Canadian Conference on Electrical and Computer Engineering,2010:840-842.
  • 8Chen Mingju,Sun Xingbo.A digital image watermarking of self-recovery base on the SPIHT algorithm[C]//IEEE.2nd International Conference on Signal Processing Systems,2010:621-623.
  • 9Jayanthi V E, Rajamani V, Karthikayen P. Perfor- mance analysis for geometrical attack on digital image watermarking [J]. International Journal of Electronics, 2011, 98(11)1565-1580..
  • 10XIE R S, WU K S, XU G P, et al. Research on anti- counterfeiting quick response 2D barcode techniques based on digital watermark [J]. Journal of Shanghai Jiaotong University (Science) ,2013(18) :443-447.

引证文献2

二级引证文献2

;
使用帮助 返回顶部