期刊文献+

一种类可感知噪声阈值矩阵的空域计算方法 被引量:2

A Spatial Algorithm for Computing Perceptible Noise Threshold Matrix
下载PDF
导出
摘要 本文通过对人类视觉系统HVS(Human Visual System)的特点的分析,针对一般计算可感知噪声阈值矩阵方法均在频域进行且相对比较复杂的缺点,提出了一种类可感知噪声阈值矩阵,它可在空域直接计算。实验表明该方法简单、直观且具有较好的应用效果。 This paper presented a new perceptible noise threshold matrix algorithm that directly computed in spatial domain by analyzing the character of HVS (Human Visual System) and the deficiency of common percep- tible noise threshold matrix algorithm which usually be computed in frequency domain. Tests show that this al- gorithm is simple and effective.
出处 《仪器仪表学报》 EI CAS CSCD 北大核心 2003年第z2期387-388,共2页 Chinese Journal of Scientific Instrument
基金 吉林省科技发展计划项目(20010583)
关键词 人类视觉系统 数字水印 噪声阈值矩阵 HVS Digital watermarking Noise threshold matrix
  • 相关文献

参考文献4

  • 1[1]I.J.Cox, M.L.Miller, J.A.Bloom. Watermarking applications and their properties. Published in the Int. Conf. on Information Technology 2000. Lasvegas:2000.
  • 2[2]F. Hartung, B. Girod. Watermarking of MPEG-2 encoded video without decoding and re-encoding Multimedia Computing and Networking 1997. published as SPIE 3020, 1997. 264~273.
  • 3[3]K. Matsui, K. Tanaka. Video-stegano graphy:How to Secretly Embed a Signature in a Picture. Journal of the Interactive Multimedia Associcationm Intellectual Property Project, 1994, 1(1):187~206.
  • 4[4]M.S.Kankanhalli, Rajmohan, Ramakrishnan. Content Based Watermarking of Images. ACM Multimedia'98.

同被引文献19

  • 1朱晓冬,刘静,苑森淼.DCT域盲嵌入的正态实数伪随机序列水印方案探讨[J].仪器仪表学报,2003,24(z2):418-419. 被引量:1
  • 2朱晓冬,刘静,苑森淼,齐丽凤.一种基于置乱和哈达玛变换的空域图像水印算法[J].仪器仪表学报,2003,24(z2):483-484. 被引量:6
  • 3张荣跃,倪江群,黄继武.基于小波域HMM模型的稳健多比特图像水印算法[J].软件学报,2005,16(7):1323-1332. 被引量:19
  • 4CHANG C C, CHUNG C Y. An Enhanced Buyer-Seller Watermarking Protocol [ C] //IEEE Proceedings of ICCT. Beijing, China: Institute of Electrical and Electronics Engineers Ine, 2003: 1779-1783.
  • 5COX I J, KILIAN J. Secure Spread Spectrum Watermarking for Images, Audio and Video [ C] //Proceedings of IEEE International Conference on Image Processing. Lausanne, Switz: IEEE, 1996: 243-246.
  • 6ANIL K, JAIN, UMUT ULUDAG. Hiding Biometric Data [ J ]. IEEE Transaction on Pattern Analysis and Machine Intellgence, 2003, 25 (11): 1494-1498.
  • 7SUNG SHIK KOH, CHUNG HWA-KIM. Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking [ C ] //AIS2004. Betlin: Springer, 2004 : 498-507.
  • 8YANG SUN-lEE, HEAU-JO KANG, YOON HO KIM. Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme [ C ] //Knowledge-Based Intellient Information and engineering Systems. Betlin: Springer, 2005: 567-572.
  • 9QIAO L, NAHRSTEDT K. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights [J]. Journal of Visual Communication Image Represent, 1998, 9 (3) : 194-210.
  • 10DANIEL AUGOT, JEAN-MARC, JEAN-FRANCOIS. Secure Delivery of Image over Open Networks [ J]. IEEE, 1999, 87 (7) : 1251-1266.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部