期刊文献+

基于小波变换的自适应公钥数字水印 被引量:2

A Wavelet Based Adaptive Public Key Watermarking Algorithm
下载PDF
导出
摘要 利用小波变换良好的时频局部特性,提出了一种基于小波变换的自适应公钥数字水印设计方案。数据的所有者利用私钥向数据中嵌入版权信息,任何数据使用者可以利用公钥从接收到的数据中提取版权信息。水印的嵌入强度可根据原始图像自身的特点自适应调节,水印的提取也不需要原始图像。实验结果表明该算法具有良好的不可视性和抗联合图像专家组压缩、剪切、滤波等攻击的能力。 A wavelet-based adaptive public key watermarking algorithm is presented in the paper. Data owner can use his private key embed the identification into the local image and retrieve it from the watermarked image. The data users can use the public key detect the identification from the watermarked image. How much the embedding strength is adjusted adaptively to the local image characteristics. The experimental results have shown that the proposed watermark is invisible to human eyes and very robust to joint photographic experts group compression attack, crop attack and so on.
作者 张洪 刘晓云
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第1期63-65,共3页 Journal of University of Electronic Science and Technology of China
关键词 公钥数字水印 小波变换 公钥 私钥 public key digital watermark discrete wavelet transform private key public key
  • 相关文献

参考文献4

  • 1邹潇湘,李锦涛,彭聪.非对称数字水印技术研究[J].计算机工程与应用,2002,38(16):7-10. 被引量:15
  • 2孙鑫,易开祥,石教英,费敏锐.公开钥数字水印系统研究[J].计算机辅助设计与图形学学报,2003,15(7):875-879. 被引量:10
  • 3SHAO Ya-fei,WU Guo-wei,LIN Xing-gang.A wavelte based adaptive watermrking algorithm[C]// Info-Tech and Info-Net,Proceedings,ICⅡ 2001-Beijing 2001 International Conferences on,IEEE 2001,3(29):384-389.
  • 4TSAI Min-jin,YU Kuang-yao,CHEN Yi-zhang.Joint wavelet and transformation ROR ditital watermarking[J].Consumer Electronics,IEEE Transactions on,2000,46(Issue:1):237-241.

二级参考文献25

  • 1[1]Joachim J Eggers,Jonathan K Su,Bernd Girod. Asymmetric watermarking schemes,Sicherheit in Mediendaten.GMD Jahrestagung,Proceedings ,Springer Verlag, 2000
  • 2[2]Scott Craver,Stefan Katzenbeisser. Copyright protection protocols based on asymmetric watermark:the ticket concept[C].In:Proceedings of the Sixth Conference on Communication and Multimedia Security(CMS'01),German ,2001: 159~170
  • 3[3]Bruce Schneier. Applied Cryptograpy: Protocols, Algorithms,and Source Code in C[M].2nd ed,New York:John Wiley and Sons,1996
  • 4[4]Frank Hartung,Bernd Girod.Copyright protection in video delivery networks by watermarking of pre-compressed video[C].In :2nd European Conference on Multimedia Applications,Services and Techniques (ECMAST'97), Milan, Italy, Lecture Notes in Computer Science,1997; 1242:423~436
  • 5[5]Frank Hartung,Bernd Girod. Watermarking of uncompressed and compressed video[J].Signal Processing,Special issue on copyright protection and access control for multimedia services, 1998 ;66(3):283~301
  • 6[6]Frank Hartung,Bernd Girod.Fast public-key watermarking of compressed video[C].In:Proceedings of the IEEE International Conference on Image Processing(ICIP97),Santa Barbara,CA,USA,1997;1:528~531
  • 7[7]R G van Schyndel,A Z Tirkel,I D Svalbe. Key independent watermark detection[C].In:IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999; 1: 580~585
  • 8[8]Joachim J Eggers,Jonathan K Su,Bernd Girod. Public key watermarking by eigenvectors of linear transforms[C].In :European Signal Processing Conference( EUSIPCO'2000 ) , Tampere,Finland,2000
  • 9[9]Joachim J Eggers,Bernd Girod. Robustness of public key watermarking schemes[C].In:V3D2 Watermarking Workshop,Erlangen,Germany,1999
  • 10[10]T Furon,P Duhamel.An asymmetric public detection watermarking technique[C].In:Workshop on Information Hiding,Dresden,Germany,1999

共引文献23

同被引文献14

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部