期刊文献+

结合B样条小波的半脆弱水印

A Semi-fragile Digital Watermarking Scheme Based on B-spline Wavelet
下载PDF
导出
摘要 根据两条B样条曲线低分辨表示部分的大小关系在JPEG压缩下较稳定的特点提出了一种用于图像认证的半脆弱数字水印方法。产生一个依赖于原图像内容的水印,将图像进行8×8分块,并分为两组,在每一组中分别取一个分块,选择特定点的像素值作为控制顶点,构造B样条曲线,对B样条进行多分辨分解,通过修改两条B样条曲线低分辨表示部分的大小关系嵌入水印。该算法可以检测并定位被修改的位置,可用于图像的完整性认证,并有一定的抗压缩能力。 A semi-fragile watermarking for image authentication which based on the factor that the spatial relationship between couple low-resolution of B-spline withstands JPEG compression is proposed. Firstly, a content-based watermark is created from the original image. All 8×8 blocks are divided into two sets, two couples B-spline are defined in each couple block. Then these B-spline curves are decomposed. The bits of watermark are embedded by modifying the relationship between couple B-splines' low-resolution coefficients. The algorithm can detect and locate the tamper of the image. It can be used for integrity authentication.
出处 《莆田学院学报》 2007年第2期62-65,共4页 Journal of putian University
基金 福建省自然科学基金资助项目(A0510012)
关键词 数字水印 图像认证 半脆弱水印 B样条 digital watermark image authentication) semi-fragile watermark) B-spline
  • 相关文献

参考文献2

二级参考文献19

  • 1石磊,钟铭,洪帆.抵抗几何变换的基于量化的水印技术[J].计算机辅助设计与图形学学报,2004,16(6):850-855. 被引量:18
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 3[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 4[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 5[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 6[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 7[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 8[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.
  • 9Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3/4): 313~336
  • 10Barni Mauro, Bartolini Franco, Piva A. Improved waveletbased watermarking through pixel-wise masking [J]. IEEE Transactions on Image Processing, 2001, 10(5): 783~791

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部