期刊文献+

基于灰度值统计特征的数字水印方法 被引量:1

Image Watermarking Based on Statistical Characteristics of Gary Value
下载PDF
导出
摘要 提出了一种基于图像分块灰度值统计特征的数字水印方法,算法利用图像分块的灰度差异值判定水印信息的嵌入位置,对选定的图像分块进行DCT变换,然后将水印信息嵌入到中频系数当中。由于水印信息嵌入到了纹理复杂度因子比较大的块中,因此就增强了水印信息的不可见性。实验表明,本算法较好地保持了原始图像的品质,对非几何攻击和有损压缩具有较好的稳健性。 An image watermarking algorithm based on statistical characteristics of the image segmentation is proposed in this file. The embedding location is decided by calculating the different value of the gray values of image segmentations. And then watermarking information is embedded into the meddle coefficients of the DCT transformation of the selected host image segmentations. Watermarking information is embedded into image segmentation that has larger texture complication, and the watermarking information is invisible. Experimental results show that the algorithm maintains the quality of the original image and is robust to non-geometric attack and loss compression.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第2期138-140,共3页 Computer Engineering
基金 国防基础科研基金资助项目 江苏省自然科学基金资助项目(BK2002080)
关键词 数字水印 图像分块 灰度值 不可见性 基于图像 几何攻击 嵌入 有损压缩 DCT变换 灰度差 Watermarking Image segmentation Statistical characteristics Texture complication
  • 相关文献

参考文献3

二级参考文献13

  • 1[1]Lin E T, Delp E J. A Review of Fragile Image Watermarks[A]. ACM Multimedia '99[C]. Orlando,1999.25-29.
  • 2[2]Fridrich J. Methods for Detecting Changes In Digital Images[A], Proc. of The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98)[C]. Australia: Melbourne, 1998.
  • 3[3]Lin E T, Podilchuk C I, Delp E J. Detection of Image Alterations Using Semi_fragile Watermarks[A]. Proc. of SPIE Int. Conf. on Security and Watermarking of Multimedia Contents[C]. CA: San Jose, 2000. 3971.
  • 4[4]Wolfgang R B, Delp E J. A Watermark for Digital Images[J]. Proc. IEEE on Image Processing, 1996, 3: 219-222.
  • 5[5]Yu G J, Lu C S, Sheu J P, et al. Mean Quantization Blind Watermarking for Image Authentication[A]. Proc. IEEE Int. Conf. on Image Processing(Vol III)[C]. Canada: Vancouver, 2000.706-709.
  • 6[6]Kundur D, Hatzinakos D. Digital Watermarking for Telltale Tamper Proofing and Authentication[J]. Proc. of IEEE On Image Processing, 1999, 87: 1167-1180.
  • 7[7]Hartung F, Su J K, Girod B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks[A]. Security and Watermarking of Multimedia Contents Proc. [C].SPIE 3657, 1999.
  • 8[8]Craver S, Memon N, B-L Yeo, et al. Can Invisible Watermarking Resolve Rightful Ownerships[J]. IS&T/SPIE Electronic Imaging, 1998,3022: 310-321.
  • 9[9]Watson A B, Yang G Y, Solomon J A. Visibility of Wavelet Quantization Noise[J]. Proc. of IEEE Trans. On Image Processing, 1997, (6): 1164-1175.
  • 10[10]Lin C Y, Chang S F. A Robust Image Authentication Method Surviving JPEG Lossy Compression[A]. SPIE Storage and Retrieval of Image/Video Databases[C]. CA:San Jose, 1998.

共引文献4

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部