期刊文献+

一种适用于彩色图像版权通知的数字水印算法 被引量:1

A Visible Color Image Watermarking Algorithm for Copyright Notification
下载PDF
导出
摘要 在对彩色图像及相关算法进行分析的基础上,提出了一种适用于彩色图像版权通知的可见数字水印算法。该算法同时适用于灰度图像的版权通知。在将彩色图像从RGB空间转换到HSI空间后,根据Sobel梯度算子计算嵌入水印的强度大小;在空域中自适应地嵌入可见水印以实现对图像的版权通知功能。实验结果表明,该算法操作简单且十分有效,嵌入的可见水印很难被去除,对灰度及彩色图像的版权可以起到很好的通知和保护作用。 This paper presents a visible watermarking algorithm for color image's copyright notification on the basis of analyzing color images and related algorithms. The algorithm is also adaptive to gray image. By converting color image from RGB to HSI and using the Sobel gradient to obtain the watermark coefficient, the algorithm embeds the visible watermark adaptively to complement image copyright notification. Experimental results verifies that the embedded watermark can hardly be ridden. The method does image copyright notification easily and successfully.
出处 《测绘科学技术学报》 北大核心 2007年第2期90-92,共3页 Journal of Geomatics Science and Technology
基金 国家"十一五"计划预研项目(40601030403)
关键词 可见数字水印 版权通知 RGB HSI Sobel梯度算子 visible watermark copyright notification RGB HSI Sobel gradient
  • 相关文献

参考文献5

  • 1田震,张晓娟.数字水印及其鲁棒性研究[J].测绘学院学报,2004,21(1):54-56. 被引量:11
  • 2陆哲明,吴昊天,刘忠仁,孙圣和.一种用于版权通知和保护的多功能彩色图像水印算法[J].电子学报,2004,32(5):778-781. 被引量:18
  • 3[4]Rafael C Gonzalez,Richard E Woods.Digital Image Processing (2nd Edition)[M].Beijing:Publishing House of Electronics Industry,2002:241-243.
  • 4[5]Kankanhalli M S,Rajmohan Ramakrishnan K R.Adaptive visible watermarking of images[A].Proc of IEEE,Multimedia Computing and Systems[C].Florence:IEEE,1999:568-573.
  • 5[6]Rafael C Gonzalez,Richard E Woods,Steven L Eddins.数字图像处理(MATLAB版)[M].北京:电子工业出版社,2004:105-108.

二级参考文献14

  • 1[1]Bender W, Gruhl D, Morimoto N. Techniques for Data Hiding[A]. Proceedings of the SPIE[C]. USA San Jose CA, 1995.
  • 2[2]Katzenbeisser, etc. Information Hiding Techniques for Steganography and Digital Watermarking[M]. London:Artech House, Inc. 2000.
  • 3[3]The Army Image: In Need of Change?. 美国政府报告ADA376361[EB/OL]. http://www. dtic. mil.
  • 4[4]Digital Watermarking: From Concepts to Real-Time Video Applications. 美国政府报告 ADA391868[EB/OL]. http://www. dtic. mil.
  • 5[5]Rice M. Strategies for Robust Digital Cartographic Steganography[A]. Proceedings of the 20th International Cartographic Conference[C]. Beijing, 2001.
  • 6Hu Y J,Kwong S.Wavelet domain adaptive visible watermarking [J].Electron Lett,2001,37(20):1219-1220.
  • 7Chen P M.A visible watermarking mechanism using a statistic approach [A].Proc of IEEE,WCCC-ICSP [C].Beijing:IEEE,2000.910-913.
  • 8Mohanty S P,Ramakrishnan K R,Kankanhalli M S.A DCT domain visible watermarking technique for images [A].Proc of IEEE,ICME [C].New York:IEEE,2000.1029-1032.
  • 9Kankanhalli M S,Rajmohan Ramakrishnan K R.Adaptive visible watermarking of images [A].Proc of IEEE,Multimedia Computing and Systems [C].Florence:IEEE,1999.1.568-573.
  • 10Meng J H,Chang S F.Embedding visible video watermarks in the compressed domain [A].Proceedings of IEEE,ICIP [C].Chicago:IEEE,1998.474-477.

共引文献26

同被引文献13

  • 1范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:62
  • 2Li Jung-Shian, Hsieh Che-Jen, Hung Cheng-Fu. Anovel DRM framework for peer-to-peer music content deliveryVJ-]. Journal of Systems and Software, 2010, 83(10) ~ 1689-1700.
  • 3Ak M, Kaya K, Selcuk A A. Optimal Subset-Differ- ence Broadcast Encryptioin with Free Riders EJ~. In- formation Sciences, 2009, 179(20) : 3673-3684.
  • 4Jamkhedkar P, Heileman G, Ortiz I. The Problem with Rights Expression Languages ~C~// Proc. Of 2006 ACM Workshop on Digital Rights Management. New York: ACM Press, 2006: 59-67.
  • 5Pretschner A, Hilty M, Schutz F, et al. Usage Con- trol Enforcement: Present and Future ~J~. IEEE Se- curity ~ Privacy, 2008, 6(4): 44-53.
  • 6Stamm S, Sheppard N P, Reihaneh S N. Implemen- ting Trusted Terminals with a TPM and SITDRM [J~. Electronic Notes in Theoretical Computer Sci- ence, 2008, 197(1) :73-85.
  • 7Yu Hai-Yan, Fan Jiu-Lun. A Blind Water- marking Using Orthogonal Finite Ridgelet Transform and Fuzzy C-Means[-J~. Journal of Software, 2010, 5 (4): 429-436.
  • 8Pfitzmann B, Waidner M. Anonymous Fingerprinting [C]//Advanees in Cryptology-Eurocrypt of LNCS. Berlin/Heidelberg: Spinger-Verlag, 1997, 1233: 88-102.
  • 9程叶霞,张雪锋.基于分段混沌系统的MP3数字版权保护技术[J].西安邮电学院学报,2010,15(1):18-22. 被引量:4
  • 10钟勇,秦小麟,刘凤玉.一种面向DRM的责任授权模型及其实施框架[J].软件学报,2010,21(8):2059-2069. 被引量:8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部