期刊文献+

量化水印算法分析 被引量:9

Analysis of quantization-based watermarking
下载PDF
导出
摘要 对量化水印算法稳健性与抗攻击能力问题,给出了公有水印算法稳健性充分必要条件和抗攻击能量上限,弥补了抗攻击能力评估上没有精确界限的缺陷。分析了载体系数的改变幅度及固定保真度优化中附加模板的取值范围,部分解决了保真度优化中出现的保护水印问题。指出了量化信息编码与一般变量信息承载之间的区别,明确了在信息容量计算中的差别原因。构造了优化视觉效果的嵌入方法和与其等价的其它10个嵌入方法。在同等的载体改变范围内,提出了比基于mod运算的水印嵌入方法抗攻击能力高一倍的量化水印算法,弥补了基于mod运算的水印嵌入方法的抗攻击能力比较低的缺陷。构造了嵌入灰度值的水印算法,避免了量化嵌入算法中把灰度值转换为二进制嵌入后所带来的缺陷。实验验证了此算法及理论分析结果。 Necessary and sufficient conditions for robustness to the public watermarking algorithm and its upper limit of attack-resistance energy were given, which supplied a gap that there was no exact upper limit in the attack-resistance evaluation. Then it analysed change amplitude of the carder's coefficients and range of the added pattern in fidelity-fixed optimization, which partly solved the problem of protecting watermarking during fidelity-fixed optimization, and pointed out the difference between quantization encoding and common variable information payload and the reasons of difference in information capacity calculation. After that, a vision optimized embedding algorithm and other ten equivalent ones were constructed. And then a quantization watermarking scheme with twice attack-resistance of mod-based embedding algorithms was proposed in the same carrier altered range, which overcomed the disadvantage of low attack-resistance to Mod-based watermarking schemes. Also, it constructed gray level embedding schemes which avoided the transformation from gray value to binary. Finally, the experimental results support the theoretic analysis and presented schemes.
出处 《通信学报》 EI CSCD 北大核心 2006年第3期15-27,共13页 Journal on Communications
基金 国家自然科学基金资助项目(60133020 60325208) 国家重点基础研究发展计划("973"计划)基金资助项目(2004CB318000) 广东省自然科学基金资助项目(04205407)~~
关键词 数字水印 稳健性 量化 灰度值 同余运算 digital watermarking robustness quantization gray value congruence
  • 相关文献

参考文献17

  • 1COX I J,MILLER M L,BLOOM J A.Digital Watermarking[M].Elsevier Science,USA,2002.
  • 2COX I J,KILIAN J,LEIGHTON F T,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,7(12):1673-1687.
  • 3DJUROVIC I,STANKOVIC S,PITAS I.Digital watermarking in the fractional Fourier transformation domain[J].Journal of Network and Computer Applications,2001,24:167-173.
  • 4MILLER M L,DOERR G J,COX I J.Applying informed coding and embedding to design a robust,high capacity watermark[J].IEEE Trans on Image Procesing,2004,13(6):792-807.
  • 5LIN C Y,WU M,LUI Y M,et al.Rotation,scale,and translation resilient public watermarking for images[J].IEEE Transactions on Image Processing,2001,10(5):767-782.
  • 6KANG X G,HUANG J W,SHI Y Q.A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression[J].IEEE Trans on Circuits and Systems for Video Technology,2003,13(8):776-786.
  • 7FRIDRICH J,GOLJAN M,DU R.Steganalysis based on JPEG compatibility[A].Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding.SPIE Multimedia Systems and Applications Ⅳ[C].2001.275-280.
  • 8O'RSULLIVAN J A,MOULIN P,ETTINGER J M.Information-theoretic analysis of steganography[A].Proceedings of IEEE International Symposium on Information Theroy[C].1998.297.
  • 9MOULIN P,O'RSULLIVAN J A.Information-theoretic analysis of watermarking[A].Proceedings of the International Conference on Acoustics,Speech and Signal Processing[C].2000.3630-3633.
  • 10TSAI M J,YU K Y,CHEN Y Z.Joint wavelet and spatial transformation for digital watermarking[J].IEEE Trans on Consumer Electronics,2000,46(1):241-245.

二级参考文献1

共引文献6

同被引文献69

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部