期刊文献+

一种用于图象认证的脆弱水印算法设计 被引量:2

A Watermarking Method Designation Used For Image Authentication
下载PDF
导出
摘要 脆弱水印是一种很容易被修改或破坏的标识,根据其易被破坏的特性,脆弱水印非常适合用于图像内容的认证。本文提出一种算法,在图像的离散小波域中加入数字水印,它既可以在空域也可以在频域检测图像的变化。这种方法可以防止多种篡改方式,如数据替换、滤波及有失真压缩等。此外通过对所选定的图像小波变换系数量化后嵌入水印,提高了防篡改检测的敏感性。 Fragile Watermarking is a mark which can be easily changed or destructed, Just because of the character of easy change, it quite suits the image authentication, A new watermarking method was presented in the paper, which can not only be used for the airspace but also for the frequency domain to detect the change of the image, The method can prevent many kinds of tamper, such as data replacing, filtering and distorted compressing.
作者 陈珂
机构地区 苏州市职业大学
出处 《微计算机信息》 北大核心 2007年第18期79-80,75,共3页 Control & Automation
基金 苏州职业大学2006年度科研基金资助项目(SZD06L26)
关键词 脆弱水印 图象认证 防篡改 Fragile Watermarking, Image Authentication, Tamper-Defending
  • 相关文献

参考文献5

  • 1Torres,M Kunt.Video Coding.The Sceond Generation Approach[M].Kluwer Academeic Publishers,1995
  • 2J Johnston,N Jayant,R safranek.Signal compression based on models of human perception[J].proceedings of IEEE,1993:81(10):1385-1422
  • 3Choong-Hoon Lee; Hwang-Seok Oh; Yunju Baek; Heung-Kyu Lee; Adaptive digital image watermarking using variable size of blocks in frequency domain[J]:Proceedings of the IEEE Region 10Conference Volume 1999 Page(s):702-705 vol.1
  • 4王贵竹,李津生,洪佩琳.变进位记数制与伪随机序列的产生[J].中国科学技术大学学报,2000,30(4):438-443. 被引量:6
  • 5茅时群,高健.灰度图像水印的自适应二维数字水印算法[J].微计算机信息,2006,22(01S):184-186. 被引量:17

二级参考文献13

  • 1朱磊,陆亨立.基于ASIC设计的图像采集系统的实现[J].微计算机信息,2005,21(2):160-161. 被引量:14
  • 2肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 3Tirkel A Z,et al.Electronic watermark[J].Digital image computing Technology and Application (DICTA'93),1993,Macquarie University,663~673.
  • 4Kutter M,Jordan F,Bossen F.Digital signature of color images using amplitude modulation[J].Preceeding of SPIE,storage and retrieval for image and video databases,1997,3022:518~526
  • 5Cox I J,et al.A Secure Robust Watermarking for Multimedia[J].Workshop on Information Hiding,Cambridge,UK,1996,Number 1174 in Lecture Notes in Computer Science.Spring-Verlag,185~206.
  • 6Azriel Rosenfeld,Avinash C Kak.Digital Picture Processing[M].New Youk San Francisco,London:Academic Press,1976:46-48
  • 7Torres,M Kunt.Video Coding.The Sceond Generation Approach[M].Kluwer Academeic Publishers,1995
  • 8J Johnston,N Jayant,R safranek.Signal compression based on models of human perception[J].proceedings of IEEE,1993:81 (10):1385~1422
  • 9Choong-Hoon Lee; Hwang-Seok Oh; Yunju Baek; Heung-Kyu Lee;Adaptive digital image watermarking using variable size of blocks in frequency domain[J]:Proceedings of the IEEE Region 10 Conference Volume 1999 Page(s):702-705 vol.1
  • 10杨义先,编码密码学,1992年,12页

共引文献21

同被引文献2

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部