期刊文献+

基于区域内容表征和不变矩的图像内容保护算法

Image Content Protection Based on Regional Content Representation and Invariant Moments
下载PDF
导出
摘要 文章通过图像分割技术得到图像的区域级内容表征(RegionalImageContentMap,RICM),并将表征图像RICM的不变矩编码为内容水印信息嵌入到原图像中,从而实现对原始图像的内容保护。实验结果表明,由于区域级内容表征方法及其矩特征的良好性能,算法对图像的非内容级图像操作(特别是仿射变换)具有很强的鲁棒性,且能够敏感的检测出对所保护图像的内容篡改。 A novel Image Content Protection(ICP) method is proposed in this paper.To satisfy the fundamental requirement for ICP,i.e.being robust to non-content operations and sensitive to content tampers simultaneously,a Regional Image Content Map(RICM) is derived through segmentation and its invariant moments are converted to watermarking bit stream that is embedded in the source image robustly to achieve protection of the content.Various experiments show that RICM content representation,and its invariant moments have excellent performance in ICP,and this method meets the fundamental criterion well.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第5期84-87,共4页 Computer Engineering and Applications
关键词 内容保护 内容表征 不变矩 数字水印 image content protection,image content map,invariant moments,watermarking
  • 相关文献

参考文献7

  • 1夏晓清,冯伟,赵荣椿.面向多媒体信息内容保护的特征水印技术[J].计算机应用研究,2004,21(9):164-167. 被引量:1
  • 2Ingemar J Cox,Joe Kilian,F Thomson Leighton et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing, 1997 ;6(12): 1673~1687
  • 3D Kundur,D Hatzinakos. A robust digital image watermarking method using wavelet-based fusion[C].In:Proc IEEE Int Conf Image Processing, 1997; ( 1 ) :544~547
  • 4C S Lu,H Y Liao. Structural Digital Signature for Image Authentication:An Incidental Distortion Resistant Scheme[C].In:Proc of Multimedia Security Workshop,8th ACM Int Conf Multimedia,Los Angels,2000:115~118
  • 5A Papoulis.Probability,Random Variables and Stochastic Processes[M].New York :McGraw-Hall, 1995
  • 6Hu M K.Visual pattern recognition by moment invariants[J].IRE Trans Information Theory, 1962; (2): 179~187
  • 7Henrique S Malvar,Dinei A F Florencio. Improved Spread Spectrum:A New Modulation Technique for Robust Watermarking[J].IEEE Trans On Signal Processing,2003;51(4) :898~905

二级参考文献6

  • 1Walton S.Image Authentication for a Slipppery New Age[J].Dr Dobb's J,1995,20(4):18-26.
  • 2Friedman G L.The Trustworthy Digital Camera:Restoring Credibility to the Photographic Image[J].IEEE Trans on Consumer Electron,1993,39(10):905-910.
  • 3Schneider M,Chang S F.A Roubst Content Based Digital Signature for Image Authentication[C].Proc.IEEE Int Conf Image Processing,vol 3,New York,IEEE,1996.227-230.
  • 4Yeung M M,Mitzer F.An Invisible Watermarking Technique for Image Verification[C].Proc.IEEE Int Conf Image Processing,New York,IEEE,1997.680-683.
  • 5Ingernar J Cox,Joe Kilian F,et al.Secure Spread Spectrum Watermarking for Multimedia[J].IEEE Trans.on IP,1997,6(12):1673-1687.
  • 6丁玮,闫伟齐,齐东旭.基于离散余弦变换的数字水印图象[J].北方工业大学学报,1999,11(3):71-75. 被引量:18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部