期刊文献+

一种基于矢量共享方案的DCT域上数字水印分存算法 被引量:14

A DCT Domain Digital Watermarking Sharing Algorithm Based on Vector Secret Sharing Scheme
下载PDF
导出
摘要 数字水印分存是将秘密共享的思想用于数字水印 ,将原始水印信息分解成n份分存水印信息 ,获得其中部分分存水印信息就能恢复出原始水印信息 .该文提出一种基于矢量共享方案的DCT域上的数字水印分存算法 .它将矢量共享的思想用于数字水印 .原始载体图像分块后 ,在DCT变换的低频域上加载分存后的水印数据 .水印信息隐藏前 ,对原始水印和分块水印都进行扰乱处理 ,同时分存也具有加密作用 .算法具有很高的安全性和较好的稳健性 .实验表明 ,算法还具有较好的隐藏效果和很好的抗剪切、抗压缩等功能 . Digital watermarking sharing applies the thought of the secret sharing to the digital watermarking. It divides the original watermarking information into n parts. When some parts are known, the original information can be recovered. This paper presents a digital watermarking sharing algorithm based on vector secret sharing scheme, and applies the thought of vector sharing to digital watermarking. After the original image is divided, the digital watermark is embed into the low frequency DCT domain. The algorithm disturbs both the original watermark and the sharing block watermark before hiding the original watermark. The sharing processing has the effect of disturbing too. So the algorithm has highly security and robustness. Experimental results show the algorithm has a good effect of hiding, anti-cutting and anti-compressing.
出处 《计算机学报》 EI CSCD 北大核心 2004年第7期998-1003,共6页 Chinese Journal of Computers
基金 国家自然科学基金 ( 60 0 73 0 49) 国家"八六三"高技术研究发展计划项目基金 ( 2 0 0 2AA14 3 0 41) 国家"九七三"重点基础研究发展规划项目基金 (G19990 3 5 80 4)资助
关键词 信息隐藏 数字水印 秘密共享 information hiding digital watermarking secret sharing
  • 相关文献

参考文献10

  • 1Lee Sin-Joo, Jung Sung-Hwan. A survey of watermarking techniques applied to multimedia. In: Proceedings of the 2001 IEEE International Symposium on Industrial Electronics, Piscataway, 2002, 1: 272~277
  • 2van Schyndel R.G., Tiekel A.Z., Osborne C.F.. A digital watermark. In: Proceedings of IEEE International Conference on Image Processing, Los Alomitos, 1994, 2: 86~90
  • 3Cox I.J., Linnartz J.P.M.G.. Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communication, 1998, 16(4): 587~593
  • 4Cox I.J., Linnartz J., Leighton F.T., Shamoon T.. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6(12): 1673~1687
  • 5Wang Xiao-Fan, Dai Yue-Wei, Mao Yao-Bin.Technology of Information Hiding--Methods and Applications. Beijing: Publishing House of Mechnical Industry, 2001(in Chinese)(汪小帆,戴跃伟,茅耀斌.信息隐藏技术----方法与应用. 北京:机械工业出版社,2001
  • 6Wang Chuen-Ching,Tai Shen-Chuan,Yu Chong-Shou. Repeating image watermarking technique by the visual cryptography. IEICE Transaction on Fundamentals, 2000,E83-A(8): 1589-1598
  • 7Guo Hui-Ping, Georganas N.D.. Digital image watermarking for Joint ownership verification without a trusted dealer. In: Proceedings of the IEEE ICME2003, Baltimore, 2003(http://www.discover.uottawa.ca/publications/)
  • 8Bruce Schneier. Applied Cryptography Second Edition: Protocols,Algorithms,and Souce Code in C. New York: John Wiley & Sons, Inc., 1996
  • 9Jacobson N.. Lectures in Abstract Algebra(vol Ⅱ). Princeton NJ: van Nostrand Company, Inc., 1953
  • 10Ruan Qiu-Qi. Digital Image Processing. Beijing: Publishing House of Electronics Industry, 2001(in Chinese)(阮秋琦.数字图像处理学.北京:电子工业出版社, 2001

同被引文献123

引证文献14

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部