期刊文献+

二元纯位相滤波器与半脆弱数字图像水印 被引量:1

Binary Phase-Only Filter and Semi-Fragile Digital Image Watermarking
下载PDF
导出
摘要 文章分析了一种由F.Ahmed和I.S.Moskowitz提出的基于二元纯位相滤波器(BPOF)的半脆弱数字图像水印技术。该算法作用在图像Fourier变换域,将BPOF作为水印嵌入到幅值中。其优点在于以图像内在特征(即BPOF)作为水印,不需要传递大量额外数据用于图像认证。该文着重讨论了原始图像BPOF,嵌入水印后图像BPOF,嵌入水印后图像幅值三者之间相互关系,并分析了算法的稳健性,其结论有助于该类算法的进一步改进。 A Binary Phase-Only Filter(BPOF) based semi-fragile digital watermarking technique proposed by F.Ahmed and I.S.Moskowitz is analyzed.In the Fourier domain of the image,the BPOF is embedded into the magnitude.This technique takes the inherent characteristics of the image(here is BPOF) as watermark,thus it is not necessary to transmit a lot of data for image authentication.We emphasize our discussions on the relations among the BPOF of the original image,the BPOF of the watermarked image and the magnitude of the watermarked image as well as the robustness of the algorithm.The results will benefit the further improvement of such kind technique.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第28期33-36,57,共5页 Computer Engineering and Applications
基金 图像信息处理与智能控制教育部重点实验室开放基金(编号:TKLJ0301)资助
关键词 二元纯位相滤波器 半脆弱数字水印 图像认证 离散Fourier变换 Binary Phase-Only Filter(BPOF),semi-fragile digital watermarking,image authentication,discrete Fourier transform
  • 相关文献

参考文献7

  • 1吴秋新 钮心忻 杨义先.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 2M Schneider,S-F Chang. A robust content based digital signature for image authentication [C].In:Proceedings of IEEE International Con ference on Image Processing 1996,Lausanne,Switzerland,1996.
  • 3H Zhong,F Liu,L-C Jia. A new fragile watermarking technique for image authentication [C].In:6th Int Conf on Signal Processing,IEEE, Piscataway, NJ, 2002.: 792~795.
  • 4F Ahmed,I S Moskowitz. Correlation-based watermarking method for image authentication applications[J].Optical Engineering, 2004; 43 (8): 1833~1838.
  • 5F Ahmed,I S Moskowitz.The binary phase only filter as an image watermark. http://chacs.nrl. navy. mil/publications/CHACS/2004/index 2004.html.
  • 6B V K Vijay Kumar,L Hassebrook.Performance measures for correlation filters [J].Applied Optics,1990;29:2997~3006.
  • 7J Sang,M S Alam. Binary phase-only filter based image self-authen tication[C].In:Accepted by the Conference on Optical Information Systems Ⅲ(part of the SPIE Optics & Photonics 2005 Symposium),San Diego, CA, 2005.

共引文献9

同被引文献14

  • 1COX I J, MILLER M L, BLOOM J A. Digital watermarking [M]. CA:Academic Press, 2002.
  • 2ZHU B B, SWANSON M D, TEWFIK A H. When seeing isn't believing multimedia authentication technologies [J]. IEEE Signal Processing Magazine, 2004(5) :40-49.
  • 3KATZEN B S, PETITCOLAS F A P. Information hiding techniques for steganography and digital watermarking [M].[S.l.]: Artech Houes Inc,2000.
  • 4WONG P W. A public key watermark for image verification and authentication [C] // Proceedings of the IEEE International Conference on Image Processing. Chicago: IL,1998(10): 455-459.
  • 5WONG H C, BERN M W, GOLDBERG D. An image signature for any kind of image [J]. IEEE International Conference on Image Processing, 2002,9 : 22-25.
  • 6AHMED F, MOSKOWITZ I S. Correlation-based watermarking method for image authentication applications[J]. Optical Engineering, 2004, 43 (8) : 1833-1838.
  • 7AHMED F, MOSKOWITZ I S. The binary phase only filter as an image watermark [EB/OL]. [2004-02-01]. http://www.stormingmedia.us/82/8245/A824564.html.
  • 8OPPENHEIM A, LIM J. The importance of phase in signals [J]. Proceedings of IEEE, 1981, 69 (3): 529-541.
  • 9SANG J, ALAM M S. Fragility and robustness of binary phase-only filter based fragile/semi-fragile digital image watermarking [J]. IEEE Transactions on Instrumentation and Measurement, 2008, 57 (3) : 595-606.
  • 10STALLINGS W. Cryptography and network security principles and practice [M]. [S.l. ]:Prentice Hall, 2003.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部