期刊文献+

基于DCT与双随机矩阵的图像数字水印方案 被引量:3

Image Watermarking Based on Discrete Cosine Transformation and Doubly Stochastic Matrix
下载PDF
导出
摘要 在水印的嵌入与检测过程中用到了 3个密钥 ,双随机矩阵和嵌入尺度作为秘密钥保证了水印嵌入的安全性 ,DCT系数矩阵之和则作为公开钥用于水印信息的部分认证 文中算法实现了将图像作为水印信息隐藏到载体图像中 ;把水印信息的每一点都通过某种方式嵌入到载体图像的多个点上 ;使得攻击者在不知道秘密钥的情况下无法删除或改变水印信息 通过实验对嵌入和检测结果进行了比较和分析 。 This novel DCT-based approach has three keys, the doubly stochastic matrix along with its coefficients are used to embed watermarking and play the role of private keys, while summation of transformation matrix of watermarking serves as public key. Its detection process is composed of two parts: one needs secrete key, while the other only needs public key. When both parts are correct, the detected image restores the original watermarking.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2004年第8期1127-1133,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国防基础科研项目 江苏省自然科学基金 (BK2 0 0 2 0 80 )资助
关键词 DCT 图像数字水印 双随机矩阵 嵌入算法 Zigzag变换 watermark doubly stochastic matrix DCT Zigzag transform
  • 相关文献

参考文献5

  • 1Cox I J, Miller L M, Bloom J A. Digital Watermarking [M].Kaufmann: Morgan Kaufmann, 2002. 299~302
  • 2van Schyndel R G, Tirkel A Z, Svalbe I D. Key independent watermark detection [A].In: Proceedings of International Conference on Multimedia Computing and Systems [C].Florence, Italy: IEEE Press, 1999. 580~585
  • 3Eggers J J, Su J K, Girod B. Public key watermarking by eigenvectors of linear transforms [A].In: Proceedings of European Signal Processing Conference, Tamper, Finland, 2000. 9~11
  • 4陈景林,董会英.关于两类矩阵的特征值[J].唐山师范学院学报,2001,23(5):35-37. 被引量:1
  • 5冯德锦,李象霖,张妙兰.一种DCT变换域的图象数字水印技术[J].计算机应用研究,2001,18(11):73-75. 被引量:9

二级参考文献5

  • 1张禾瑞 郝炳新.高等代数(第四版)[M].北京:高等教育出版社,2000..
  • 2徐明耀.有限群导引(第二版)[M].北京:科学出版社,1999..
  • 3蒋茂森 赵振全 等.概率论与数据统计简明教程[M].长春:吉林大学出版社,1986..
  • 4Lin Eugenet,Proceedings of the Image Processing Image Quality Image Capture Systems Conference(PICS'99)2528,1999年,274页
  • 5蒋茂森,概率论与数理统计简明教程,1986年

共引文献8

同被引文献24

  • 1易开祥,王铁,石教英.基于DCT域的自适应二维数字水印系统[J].计算机应用,2000,20(S1):12-15. 被引量:12
  • 2黄松,杨华千,张伟,韦鹏程.一个新的基于DCT的自适应数字水印算法[J].计算机科学,2006,33(6):148-149. 被引量:6
  • 3Huang J W, Shi Y Q. Embeding image watermarking in DC component[ J]. IEEE Trans on Circuits and Systems for Video Technology, 2000,10 (6) :974 - 979.
  • 4Barni M, Bartolini F, Cappellini V. A DCT - domain system for robust image watermarking [ J ]. Signal Processing, 1998,66 ( 3 ) :357 - 372.
  • 5Cox I J, Killian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia [ J]. IEEE Transactions on Image Processing,1997,6(12):1673 - 1687.
  • 6Fridrich J. Security of fragile authentication watermarks with localization [ C ]. San Jose, California : Proceedings of SPIE Photonic West, Electronic Imaging, Secruity and Watermarking of Multimedia Contents ,2002:691 - 700.
  • 7Queluz M P. Spatial watermark tor image content authentication [ J ]. Journal of Electronic Imaging,2002,11 (2) : 275 - 285.
  • 8Guo Jong Y, Lu C S, Liao H -Y M. Mean quantization- based fragile watermarking for image authentication [ J ]. Optical Engineering, 2001,40 (7) : 1396 - 1408.
  • 9Cox I J, Killian J, Leighton F T, et al. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687.
  • 10Huang Jiwu, Shi Y Q, Shi Yi. Embedding Image Watermarks in DC Components[J]. IEEE Trans. on Circuits and Systems for Video Technology, 2000, 10(6): 974-979.

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部