期刊文献+

基于混沌系统的脆弱性水印算法设计

Fragile watermarking algorithm based on chaos system
下载PDF
导出
摘要 提出了一种新的脆弱性数字水印方案,原始图像不重叠分块后求取各块的灰度平均值,然后利用混沌系统首先对其进行混沌映射,再对其用二值映射函数映射为二值序列后作为水印信息嵌入到载体图像的LSB位平面中.实验结果表明,论文提出的方案有很好的篡改定位能力和安全性. A scheme of fragile digital watermarking was proposed, where the original image was divided first into segments without overlaps, then the mean value of gray level of all segments was calculated, respectively, further they were chaotically mapped with chaos system, and finally they were transformed into hi-value array with hi-value mapping function as watermarking messages to be embedded into the LSB bitplane of bearing images. The result of experiments showed that the scheme presented possessed an excellent ability of image location with juggling actions and high security as well.
出处 《兰州理工大学学报》 CAS 北大核心 2007年第2期100-103,共4页 Journal of Lanzhou University of Technology
基金 甘肃省自然科学基金(3ZS042-B25-007) 甘肃省科技攻关项目(IGS035-A052-011)
关键词 数字水印 脆弱 混沌系统 digital watermarking fragileness chaos system
  • 相关文献

参考文献3

二级参考文献44

  • 1Bender W, Gmhl D, Morimoto N, et al. Techniques for data hiding[ J] . IBM System Journal, 1996, 35(3---4):313-335.
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey[J]. Proc of IEEE, 1999, 87(7):1062-1078.
  • 3Wu CF, Hsieh WS. Digital watermarking using zerotree of DCT. IEEE Trans. on Consumer Electronics, 2000,46(1):87-94.
  • 4Kutter M, Petitcolas FAP. Fair evaluation methods for image watermarking system. Journal of Electronic Imaging, 2000,9(4): 445-455.
  • 5Nikolaidis A, Pitas I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. on Image Processing, 2003,12(5):563-571.
  • 6Tang CW, Hang HM. A feature-based robust digital image watermarking scheme. IEEE Trans. on Signal Processing, 2003,51(4): 950-959.
  • 7Cheng Q, Huang TS. Robust optimum detection of transform domain multiplicative watermarks. IEEE Trans. on Signal Processing, 2003,51(4):906-924.
  • 8Miyazaki A, Okamoto A. Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems. IEICE Trans. on Fundamentals, 2002,E85-A(1):117-124.
  • 9Yen JC. Watermark embedded in permuted domain. IEE Electronics Letters, 2001,37(2):80-81.
  • 10Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部