期刊文献+

基于DWT-SVD域鲁棒公开水印技术 被引量:4

A Robust Public Watermarking Technique Based on DWT-SVD
下载PDF
导出
摘要 大部分利用奇异值分解的水印算法都是将水印嵌入在奇异值上,即利用了奇异值的稳定性.研究发现,奇异值分解后U矩阵的某些系数之间也具有较强的相关性.将小波变换和奇异值分解相结合,改变这些系数的相互关系,可以嵌入水印,而且提取水印时完全不需要原始图像.实验结果表明,该算法对常规图像处理如JPEG压缩、噪声、滤波和诸如剪切、缩放、旋转、平移等几何变换都具有很强的鲁棒性.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期299-303,共5页 Journal of Computer Research and Development
  • 相关文献

参考文献7

  • 1[1]E Ganic,Ahmet M Eskicioglu.Robust embedding of visual watermarks using DWT-SVD.IEEE Trans on Image Processing,2004,4(8):1141-1146
  • 2[2]C Bergman,J Davidson.Unitary embedding for data hiding with the SVD.In:Proc of Security Steganography and Watermarking of Multimedia Contents VII,SPIE 5681.San Diego:SPIE Press,2005.619-630
  • 3[3]R Liu,T Tan.A SVD-based watermarking scheme for protecting rightful ownership.IEEE Trans on Multimedia,2002,4(1):121-128
  • 4[4]A Sverdlov,S Dexter.Robust DCT-SVD domain image watermarking for copyright protection:Embedding data in all frequencies.IEEE Trans on Image Processing,2003,10(5):724-735
  • 5黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7):1290-1297. 被引量:215
  • 6周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 7杨恒伏,陈孝威.小波域鲁棒自适应公开水印技术[J].软件学报,2003,14(9):1652-1660. 被引量:71

二级参考文献30

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.
  • 10[1]Zhu, W.W., Xiong, Z.X., Zhang, Y.Q. Multiresolution watermarking for image and video. IEEE Transactions on Circuits and Systems for Technology, 1999,9(4):545~549.

共引文献361

同被引文献24

  • 1张红,马彩文,董永英,李艳.基于DWT-SVD的数字水印嵌入方法(英文)[J].科学技术与工程,2005,5(20):1540-1544. 被引量:6
  • 2王忠.基于DWT-SVD与量化相结合的盲水印算法[J].电子技术应用,2007,33(3):129-131. 被引量:3
  • 3Emir Ganic, Ahmet M. Eskicioglu. Robust DWT-SVD domain image watermarking: embedding data in all frequencies[C]. Proceedings of the 2004 Workshop on Multimedia and Security, 2004:166-174.
  • 4Sverdlov A, Dexter S, Eskiciglu A M. Robust DCT-SVD domain image watermrking for copyright protection: embedding data in all frequencies[C]. Proceedings of the 13th European Signal Processing Conference, 2005:16-19.
  • 5Zude Zhou, Bing Tang, Xinhua Liu. A block-SVD based image watermarking method[C]. Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, 2006:21-23.
  • 6张金林,陈建华.一种基于DWT-SVD的数字水印算法[C].第十四届计算机辅助设计与图形学学术会议论文,2006.
  • 7张金辉,舒志彪,曾有栋.基于神经网络和SVD的盲水印算法[C].第十二届全国图像图形学学术会议论文集,2005:121-125.
  • 8Chin-chen Chang, Pi yu Tsai, Min-Hui Lin. SVD-based digital image watermarking scheme[J]. Pattern Recognition Letters, 2005, 26(10): 1 577-1 586.
  • 9Paul Bao, Xiao-hu Ma. Image adaptive watermarking using wavelet domain singular value decomposition[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2005, 15 (1) : 96-102.
  • 10Rui Sun, Hong Sun, Tianren Yao. A SVD and quantization based semi-fragile watermarking technique for image authentication [C]. Proceedings of the 6th International Conference on Signal Processing, 2002: 1 592-1 595.

引证文献4

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部