期刊文献+

在数字图像中嵌入多水印的算法研究 被引量:3

Research on Algorithm of Embedding Multi-watermarking in Digital Image
下载PDF
导出
摘要 在数字产品中嵌入数字水印是进行数字产品版权保护的一种有力手段。近年来已有多种数字水印设计方案被提出,但是这些水印嵌入方案大多基于一种标志性水印的嵌入。然而在多数实际应用中一种数字水印的嵌入往往不能满足实际需要。在分析单水印方案基础上,提出在数字产品中嵌入多种水印的方案,在不同的数字水印中带有不同的水印信息。分析了多水印嵌入的优点,并设计了两种数字水印的嵌入算法,分析并讨论了两种数字水印的嵌入设计方案。最后用理论与实验分析结果证实了多水印设计方案的有效性和优越性。 Digital watermarking technology is a kind of method to protect digital products.Many different schemes have been proposed.But all of them embedded with single watermarking.However in many applications it needs multi-watermark.This paper analyzes the characteristic of single watermarking,then proposes a kind of multi-watermarking schemes,and analyzes them.The method has been proved effective and superiority by theoretic analysis and experiments.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第21期41-44,共4页 Computer Engineering and Applications
基金 重庆市科技计划项目(编号:8503) 重庆市科委应用基础研究项目(编号:7370) 重庆师范大学校内基金(网络安全技术)资助
关键词 单水印 多水印 数字水印 版权保护 混沌 single-watermark,multi-watermark,digital watermarking,copyright protection,chaos
  • 相关文献

参考文献9

  • 1邹潇湘,李锦涛,彭聪.非对称数字水印技术研究[J].计算机工程与应用,2002,38(16):7-10. 被引量:15
  • 2J Jiang,A Armstrong.Data hiding approach for efficient image indexing[J].Electronics letters.7th November 2002;38(23):1424~1425
  • 3张力,韦岗.一种DCT域的闭环数字水印技术[J].通信学报,2002,23(4):1-10. 被引量:7
  • 4潘蓉,高有行.采用水印扩展与F范数的水印技术[J].计算机辅助设计与图形学学报,2002,14(7):667-670. 被引量:2
  • 5P S L M Barreto,H Y Kim,V rijmen. Toward secure public-key blockwise fragile authentication watermarking[J].IEE Proc-Vis. Image Singal Process,2002; 149(2)
  • 6Junquan Hu,Jiwu Huang,Daren Huang et al.Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics letters,2002 ;38 (24): 1512~1513
  • 7C-C chang,K-Hwang,M S-Hwang. Robust authentication scheme for protecting copyrights of image graphoics[J].IEE Proc-Vis. Image Singal Process, 2002; 149 (1)
  • 8Junichi Kishigami,Hiroshi Fujii.. Meta-Watermarking. Content ID Forum,2001
  • 9陈永红.基于混沌的图像的数字水印隐藏算法[J].计算机仿真,2003,20(9):63-65. 被引量:12

二级参考文献41

  • 1[1]Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain[J]. Signal Processing, 1998, 66(3):385~403
  • 2[2]Braudaway G W. Protecting publicly-available images with an invisible image watermark[A]. In: Proceedings of IEEE International Conference on Image Processing, Santa Barbara, California, 1997. 524~527
  • 3[3]Xia X-G, Boncelet C G, Arce G R. A multiresolution watermark for digital images[A]. In: Proceedings of IEEE International Conference on Image Processing, Santa Barbara, California, 1997. 548~551
  • 4[4]Hsu C T, Wu J L. Hidden digital watermarks in images[J]. IEEE Transactions on Image Processing, 1999, 8(1): 58~68
  • 5[6]Kutter M, Petitcolas F A P. A fair benchmark for image watermarking systems[A]. In: Ping Wah Wong, ed. Proceedings of SPIE the 11th Annual Symposium, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, California, 1999,3657:219~239
  • 6[7]Niu X M, Lu Z M, Sun S H. Digital watermarking of still images with gray-level digital watermarks[J].IEEE Transactions on Consumer Electronics, 2000,46(1):137~145
  • 7[1]Joachim J Eggers,Jonathan K Su,Bernd Girod. Asymmetric watermarking schemes,Sicherheit in Mediendaten.GMD Jahrestagung,Proceedings ,Springer Verlag, 2000
  • 8[2]Scott Craver,Stefan Katzenbeisser. Copyright protection protocols based on asymmetric watermark:the ticket concept[C].In:Proceedings of the Sixth Conference on Communication and Multimedia Security(CMS'01),German ,2001: 159~170
  • 9[3]Bruce Schneier. Applied Cryptograpy: Protocols, Algorithms,and Source Code in C[M].2nd ed,New York:John Wiley and Sons,1996
  • 10[4]Frank Hartung,Bernd Girod.Copyright protection in video delivery networks by watermarking of pre-compressed video[C].In :2nd European Conference on Multimedia Applications,Services and Techniques (ECMAST'97), Milan, Italy, Lecture Notes in Computer Science,1997; 1242:423~436

共引文献31

同被引文献24

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部