期刊文献+

图像双层划分和奇异值分解的数字水印算法 被引量:4

Two-layer partition and singular value decomposition based image watermarking
下载PDF
导出
摘要 为提高数字水印的安全性,提出了一个新的基于图像双层网格划分和奇异值分解的数字水印算法.讨论了图像双层网格划分的概念和方法,对基于奇异值分解的单层水印算法中的水印嵌入函数进行了改进.该算法采用传统算法对图像的第一层网格进行水印嵌入后,再采用具有补偿特性的水印嵌入方法,对图像的第二层网格进行水印嵌入,同时通过迭代过程,提取稳定的水印信息.实验结果表明,该算法对嵌入的水印具有很好的透明性,对重采样、平滑、加噪声和压缩攻击具有较强的稳健性.当一层水印被完全消除时,另一层水印仍能较好的被提取出来,使数字水印的安全性得以提高. For improving the security of watermark, a novel image digital watermarking algorithm based on two-layer gridding partition and singular value decomposition was proposed. The concept and method of two-layer gridding partition of an image were discussed, and then the watermark imbedding function of singular value decomposition based single layer watermarking algorithm was created. Watermark was embedded into the first layer partition of the image adopting traditional algorithm, then embedded into the second layer partition using compensatory watermark embedding method, and then stable watermark was extracted with iteration method, Experimental results show that the algorithm has a good transparence of the embedded watermark and is robust against attacks including resampling, smoothing, noise adding and compression. The algorithm can extract one layer watermark when another layer watermark is removed, and watermark security is improved.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2006年第12期2088-2092,共5页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(60372033)
关键词 数字水印 双层网格 奇异值分解 双层水印 迭代方法 digital watermarking two-layer partition SVD two-layer watermarking iteration method
  • 相关文献

参考文献10

  • 1LIU Rui-zhen,TAN Tie-niu.A new SVD based image watermarking method[C]∥Proceedings of 4th Asia Conference of Computer Vision.Taiwan:IEEE,2000.63-67.
  • 2LIU Rui-zhen,TAN Tie-niu.An SVD-based watermarking scheme for protecting rightful ownership[J].IEEE Transactions on Multimedia,2002,4(1):121-128.
  • 3CHANDRA D V S.Digital image watermarking using singular value decomposition[C]∥Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems.Tulsa:IEEE,2002:264-267.
  • 4GANIC E,ZUBAIR N,ESKICIOGLU A M.An optimal watermarking scheme based on singular value decomposition[C]∥Proceedings of the IASTED International Conference on Communication,Network,and Information Security.Uniondale:Acta,2003:85-90.
  • 5周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 6李海峰,王树勋,温泉,宋巍巍.基于SVD和ICA的鲁棒水印算法[J].中山大学学报(自然科学版),2004,43(A02):53-57. 被引量:6
  • 7陈永红,黄席樾.基于混沌映射和矩阵奇异分解的公开数字水印技术[J].计算机仿真,2005,22(1):138-141. 被引量:12
  • 8GORODETSKI V I,POPYACK L J,SAMOILOV V,et al.SVD-based approach to transparent embedding data into digital images[C]∥Proceedings of International Workshop on Mathematical Methods,Models and Architectures for Computer Network Security.London:Springer Verlag,2001:263-274.
  • 9SUN Rui,SUN Hong,YAO Tian-ren.A SVD and quantization based semi-fragile watermarking technique for image authentication[C]∥Proceedings of 6th International Conference on Signal Processing.Beijing:Tsinghua University Press,2002:1592-1595.
  • 10胡志刚,谢萍,张宪民.一种基于奇异值分解的数字水印算法[J].计算机工程,2003,29(17):162-164. 被引量:23

二级参考文献22

  • 1陈大新.矩阵理论(修订版)[M].上海:上海交通大学出版社,2000-07..
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 3Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 4Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 5Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 6Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 7Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 8Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 9Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 10Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献116

同被引文献53

引证文献4

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部