期刊文献+

基于模运算的DCT域二维水印嵌入与盲提取算法 被引量:1

Blind Image Watermarking Algorithm Based on DCT of Modular Arithmetic
下载PDF
导出
摘要 数字水印是实现数字产品版权保护的有效办法,本文在离散余弦变换域内对数字图像的隐蔽嵌入和提取算法进行了研究,实现了基于DCT中频的二维水印嵌入与盲提取算法,该算法以模运算为基础,实验结果表明,该算法针对图像压缩和噪声等攻击具有较好的鲁棒性。 Digital watermarking is an effective method in the copyright protection of digital products.With research work on secret image embedding and extracting technology based on DCT algorithm,this paper puts forward an image watermark embedding and checking technology.In this approach,the 2D watermarks are embedded into the DCT middle frequency with modular arithmetic.The experimental results show that this technology meets the demand of robustness under the attack of compress and noise.
作者 梁新生 江健
出处 《计算机与现代化》 2004年第10期114-116,共3页 Computer and Modernization
关键词 数字水印 模运算 嵌入算法 盲提取算法 digital watermark modular arithmetic embedding algorithm extracting algorithm
  • 相关文献

参考文献3

二级参考文献14

  • 1容观澳.计算机图像处理[M].北京:清华大学出版社,1998..
  • 2[1]Bender W,Gruhl D,Morimoto N. Techniques for Data Hiding [A]. Niblack W, Jain R C. Storage and Retrieval for Image and Video Databases Ⅲ[C].New York:SPIE Press,1995,2420:164-173.
  • 3[2]Petitcolas F A P,Anderson R J, Kuhn M G. Information Hiding-A Survey [J].Proceedings of the IEEE, 1999,87(7):1062-1078.
  • 4[3]Petitcolas F A P,Anderson R J. Weakness of Copyright Masking Systems [EB/OL].http://www.cl.cam.ac.uk/~fapp2/publications/acm98-weaknesses.doc,1998-09-10.
  • 5[4]Craver S,Memon N,Yeo B L,et al.Can Invisible Watermarks Resolve Rightful Ownerships?[EB/OL]. http://isse.gmu.edu/~njohnson/Steganography/bib/pub/8214.ps,1996-07-25.
  • 6[5]Petitcolas F A P,Anderson R J. Evaluation of Copyright Marking Systems [EB/OL].http://intl.ieeexplore.ieee.org, 1999-06-07.
  • 7[6]Voloshynovskiy S,Pereira S, Iquise V,et al. Attack Modelling: Towards a Second Generation Watermarking Benchmark [J].Signal Processing, 2001,81(6):1177-1214.
  • 8[7]Tirkel A,Rankin G A, Ho W J,et al.Electronic Water Mark [EB/OL].http://www.physics.monash.edu.au/~ron/papers/DICTA93.PDF,1993-01-11.
  • 9[8]Cox I,Kilian J,Leighton Tom,et al. Secure Spread Spectrum Watermarking for Multimedia[R].Princeton:NEC Research Institute, 1995-10-25.
  • 10[9]Christine I Podilchuk,Wenjun Zeng.Image-Adaptive Watermarking Using Visual Models [J].IEEE Trans on Selected Areas in Communication,1998,16(4):525-539.

共引文献16

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部