期刊文献+

一种用于版权保护的混合域数字图像水印算法 被引量:7

A Digital Image Watermarking Scheme for Copyright Protection in DCT and DWT Domain
下载PDF
导出
摘要 提出一种用于版权保护的混合域数字图像水印算法。该算法具有以下特点:①根据宿主图像自身局部特性,实现基于图像内容的自适应块分割;②充分利用人眼视觉感知特性,实现嵌入位置的自适应确定及水印信息的自适应嵌入;③数字水印的提取不需要原始载体图像。实验结果表明该混合域自适应图像水印算法不仅具有较好的透明性,而且对诸如叠加噪声、JPEG压缩、平滑滤波、几何剪切、图像增强、马赛克效果等攻击均具有较好的鲁棒性。 An adaptive watermarking scheme for texture image in DCT and DWT domain is proposed. First, the host image is divided into blocks by local properties to increase the perceptual invisibility. Second, the significant blocks are selected in the divided blocks, DWT and DCT are performed, and the significant coefficients are determined by human visual system (HVS). Finally, the binary watermark sequence is embedded adaptively by modifying the significant DWT/DCT coefficients according to inter-block correlation of coefficients. The algorithm can extract the watermark without the help from the original image. The experimental results prove that the proposed scheme is invisible and has a good robustness against several image processing such as cropping, compression, filtering, noise adding, image enhancement, and mosaic.
出处 《测绘学报》 EI CSCD 北大核心 2006年第3期240-244,250,共6页 Acta Geodaetica et Cartographica Sinica
基金 辽宁省自然科学基金项目(20032100)
关键词 数字水印 纹理图像 DWT DCT digital watermarking texture image DWT DCT
  • 相关文献

参考文献13

  • 1COX I J,MATT L,MILLER.The First 50 years of Electronic Watermarking[J].EURASIP Journal on Applied Signal Processing,2002,56(2):126-132.
  • 2易开祥,石教英,孙鑫.数字水印技术研究进展[J].中国图象图形学报(A辑),2001,6(2):111-117. 被引量:161
  • 3BARNI M,BARTOLINI F,CAPPELLINI V.A DCT-Domain System for Robust Image Watermarking[J].Signal Processing,1998,66(3):357-372.
  • 4LUMINI A,MAIO D A.A Wavelet-based Image Watermarking Scheme[A].ITCC00 Proc 2000 Int Conf Information Tech:Coding and Computing[C].Las Vegas:IEEE Signal Processing Society,2000.122-127.
  • 5KAEWKAMNERD N,RAO K R.Wavelet Based Image Adaptive Watermarking Scheme[J].Electronics Letters,2000,36(2):312-313.
  • 6KIM J R,MOON Y S.A Robust Wavelet-based Digital Watermark Thresholding[A].ICIP99 Proc 1999 Int Conf Image Processing,vol.2[C].Kobe:IEEE Signal Processing Society,1999.202-204.
  • 7KUNDER D,HATZINAKOS.Attack Characterization for Effective Watermarking[A].ICIP99 Proc 1999 Int Conf Image Processing,vol.2[C].Kobe:IEEE Signal Processing Society,1999.240-244.
  • 8NIU Xia-mu,LU Zhe-ming,SUN Sheng-he.Digital Watermarking of Still Images with Gray-level Digital Watermarks[J].IEEE Trans on Consumer Electronics,2000,46(1):137-145.
  • 9夏光升,陈明奇,杨义先,胡正名.基于模运算的数字水印算法[J].计算机学报,2000,23(11):1146-1150. 被引量:34
  • 10INOUE H,MIYAZAKI A,TAKASHI A.Digital Watermark Method Using the Wavelet Transform for Video Data[A].Proc 1999 Int Symp Circuits and system[C].Orlando FL:IEEE Circuit and System Society,1999.247-250.

二级参考文献29

  • 1Podilchuk C I,IEEE J Special Areas Communications,1998年,16卷,4期,525页
  • 2Koch E,Proceedings of 1995 IEEE Workshop on NonlinearSignal and Image Processing,1995年,452页
  • 3Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8,143 (4):250-256.
  • 4Bender W, Gruhl D, Morlmoto N et al, Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
  • 5Kobayashi. Digital watermarking:Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
  • 6Voyatzis G, Nikolaidis N, Pitas 1. Digital watermarking: An overview. In:9th European Signal Processing Conference.Island of Rhodes,Greece. 1998:9-12
  • 7Jiri Fridrich. Appiications of data hiding in digital images. In:the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
  • 8Mahalingam Ramkumar. Data hiding in multimedia-theory and apphcations. [Ph. D. Degree], New Jerseyl Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
  • 9Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92-99.
  • 10Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102-112.

共引文献191

同被引文献69

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部