期刊文献+

确定图像降质的鲁棒性数字水印嵌入算法 被引量:3

A robust digital watermark embedding algorithm according to assigned image degradation
原文传递
导出
摘要 结合视觉系统的掩蔽特性提出了一种数字图像离散Radon变换(DRAT)域内嵌入水印的新算法。从不可见性和鲁棒性两个方面分析了在DRAT域中可嵌入水印的原因。以水印图像的峰值信噪比作为评价水印图像质量的标准,采用相互独立的Gaussian随机序列作为水印信号,导出了水印长度、嵌入深度、水印图像峰值信噪比三者之间的理论关系,给出了在给定图像质量条件下水印嵌入的自适应参数估计。利用Checkmark1.2系统对新水印算法进行了攻击测试。测试结果表明,新算法对常见的图像处理如滤波、边缘增强、对比度变化、剪切等攻击具有良好的鲁棒性。 Using the visual masking an adaptive digital watermark embedding algorithm is presented in discrete Radon transform domain. The feasibility of the algorithm is analyzed in regard to both invisibility and robustness. The independent Gausslan stochastic vector as the watermark sequence is selected, and peak signal to noise ratio (PSNR) as the criterion of image degradation grade of watermarked image is selected. The theoretical relationship between the scaling parameter and length of watermark and the PSNR is deduced. Thus the scaling parameter and the length of watermark can be estimated according to the assigned image quality gradeo Moreover, the new watermarking scheme is tested by using Checkmark 1.2 system. The experimental results show that the scheme is enough robust to some very important image processing attacks, such as filtering, edge enhancement, contrast adjust, cropping etc.
出处 《光学技术》 CAS CSCD 北大核心 2006年第4期548-552,共5页 Optical Technique
基金 国家重点基础研究973资助项目(2003CB716103) 中国博士后科学基金资助项目(2003033416)
关键词 数字水印 离散Radon变换 版权保护 信息隐藏 digital watermark discrete Radon transform copyright protection information hiding
  • 相关文献

参考文献14

  • 1Cox J,Miller L.The first 50 years of electronic watermarking[J].Journal of Applied Signal Processing,2002,(2):126-132.
  • 2Voyatzis G,Pitas I.Chaotic watermarks for embedding in the spatial digital image domain[A].Proceedings of ICIP[C].Chicago,Illinois,USA,1998.
  • 3Nikolaidis N,Pitas I.Robust image watermarking in the spatial domain[J].Signal Process,1998,66(3):385-403.
  • 4Nikolaidis A,Pitas I.Asymptotically optimal detection for additive watermarking in the DCT and DWT domains[J].IEEE Transactions on IP,2003,12(5):563-571.
  • 5Wang Y,Doherty J,et al.A wavelet-based watermarking algorithm for ownership verification of digital images[J],IEEE Transactions on IP,2002,11(2):77-88
  • 6Srdjan S,Djurovic I,et al.Watermarking in the space/spatial-frequency domain using two-dimensional radon-wigner distribution[J].IEEE Transactions on IP,2001,10(4):650-658.
  • 7Jengnan T,Wen H,Liang C.An asymmetric subspace watermarking method for copyright protection[J].IEEE Transactions on SP,2005,53:784-792.
  • 8伯晓晨,沈林成,常文森.基于拉普拉斯分布模型的DCT域图像水印视觉可见性评估[J].电子学报,2003,31(1):33-36. 被引量:6
  • 9Jian-gui Zh,Shougen S,et al.Focusing Projection of the Parabolic Radon Transform and Multiple Waves Separator,Elimination[J] J CSUT 2002,(1):76-82.
  • 10Edholm H,Herman G.Linogram in image reconstruction from projection[J].IEEE Transactions on MI,1987,6(4):301-307.

二级参考文献37

  • 1[1]E Y Lam,J W Goodman.A Mathematical Analysis of the DCT Coefficient Distributions for Images [J].IEEE Trans.on Image Processing,2000,9(10):1661-1666.
  • 2[2]I J Cox,J Kilian,T Leighton,T Shamoon.Secure Spread Spectrum Watermarking for Multimedia [J].IEEE Trans.On Image Processing,1997,6(12):1673-1687.
  • 3[3]S Craver,N Memon,B Yeo,M Yeung.Can Invisible Watermarks Resolve Rightful Ownerships? [A].SPIE Electronic Imaging:Storage and Retrieval of Image and Video Databases[C].1997.
  • 4[4]Wenjun Zeng,Bede Liu.A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownership of Digital Images [J].IEEE Trans.on Image Processing,1999,8(11):1534-1548.
  • 5[5]M Barni,F Bartolini,V Cappellini,A.Piva.A DCT-Domain System for Robust Image Watermarking [J].Signal Processing,1998,66(3):357-372.
  • 6[6]W K Pratt,Digital Image Processing [M].New York:Wiley,1978.
  • 7[7]R C Reininger,J D Gibson.Distributions of the two-dimensional DCT Coefficients for Images [J].IEEE Trans.On Communications,1983,COM-31(6):835-839.
  • 8[8]R J Joshi,T R Fischer.Comparison of Generalized Gaussian and Laplacian Modeling in DCT Image Coding [J].IEEE Signal Processing Letters,1995,2(5):81-82.
  • 9[9]M Barni,F Bartolini,V Cappellini,A Piva.Statistical Modeling of Full Frame DCT Coefficients [A].Proceedings of EUSIPCO'98 [C].Rhodes,Greece:EUSIPCO,1998.1513-1516.
  • 10Anderson R ed. Information hiding. LNCS 1174, Berlin: Spinger-Verlag, 1996.

共引文献20

同被引文献24

  • 1杨定礼,夏军,尹涵春.基于小波变换的一种数字水印隐藏方法[J].淮阴师范学院学报(自然科学版),2005,4(1):65-69. 被引量:1
  • 2吕秀丽,年桂君,王秀梅,陶利军.双重置乱技术在数字水印中的应用[J].大庆石油学院学报,2005,29(4):133-135. 被引量:2
  • 3曲宝,程玉光,乔健,林国欣.基于小波域数字水印的有序多重签名方案[J].大庆石油学院学报,2007,31(4):95-97. 被引量:1
  • 4卡斯尔曼 朱志刚 林学躢译.数字图像处理[M].北京: 电子工业出版社,2002..
  • 5章毓晋.图像工程:上册[M].北京:清华大学出版社,2006:102-103.
  • 6LEE W B, CHANG C C. Efficient group signature scheme based on the discrete logarithm[J]. IEEE proceeding: Computers and Digital Techniques, 1998,145(1):15-18.
  • 7GONZALEZ R,WOODS R’EDDINS S. Digital Image Process-ing Using MATLAB[M]. BEIJING: Publishing House of Elec-tronics Industry ?2009 : 142-158.
  • 8Taha M. Mohamed,Hesham N. Elmahdy,Hoda M. Onsi.Efficient watermark detection by using the longest common substring technique[J]Egyptian Informatics Journal,2011(2).
  • 9Imran Usman,Asifullah Khan.BCH coding and intelligent watermark embedding: Employing both frequency and strength selection[J]Applied Soft Computing Journal,2009(1).
  • 10Rafiullah Chamlawi,Asifullah Khan,Imran Usman.Authentication and recovery of images using multiple watermarks[J]Computers and Electrical Engineering,2009(3).

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部