期刊文献+

基于DWT与SVD自适应公开水印技术 被引量:3

A Image-Adaptive Public Watermarking Technique based on DWT-SVD
下载PDF
导出
摘要 在深入研究小波变换理论、奇异值分解理论的基础上,通过计算表达式来建立水印嵌入参数(如嵌入强度等)和图像质量的关系,提出了一种基于DWT与SVD鲁棒自适应的水印算法,算法中选取小波域的LL子带的最大奇异值自适应量化的方法嵌入水印,并能够盲提取,实验表明,本算法对JPEG压缩、中值滤波、亚抽样、低通滤波等图像处理有很强的稳健性。 Based on block DWT Decomposition and Singular Value Decomposition, we proposed a new algorithm with the method of embedding the watermarking into the largest singular value. Meanwhile we produced a formula to estimate the PSNR. Experiments and attack test show that the algorithm has good robustness on JPEG, median filter, sub-sampling, Gaussian low pass filter etc.
出处 《微计算机信息》 北大核心 2007年第21期67-68,90,共3页 Control & Automation
基金 湖南省教育厅科研基金资助项目(05C776)
关键词 版权保护 奇异值分解 盲水印 小波变换 copyright protection, singular value decomposition, blind watermarking, wavelet transform
  • 相关文献

参考文献5

二级参考文献20

  • 1曹政华,颜锦奎.视频图像实时小波变换系统[J].微计算机信息,2005,21(5):138-139. 被引量:16
  • 2Ming Sun Fu,et al.Data Hiding Watermarking for halftone images[J].IEEE Trans on Image Processing,2002,4:477-484.
  • 3Stefan Katzenbeisser,Fabien A P Petitcolas.Information Hiding Techniques for Steganography and Digital Watermarking[M].London:Artech House,INC,2000.
  • 4M Barni,F Bartolini,V Cappellini et al.A DWT-based technique for spatio-frequency masking of digital signatures[C].In:Proceedings of the SPIE/IS&T International 20 Conference on Security and Water-marking of Multimedia Contents,vol.3657,San Jose CA,1999:25~27.
  • 5Qi Dong-Xu,Zou Jiang-cheng,Han Xiao-You.A new class of scrambling transformation and its application in image information convering.Science in China(Series E),2000,43(3):304-312.
  • 6Patrick Bas,Jean -Marc Chassery,et,al.Geometrically invariant watermarking using feature points[J].IEEE Trans on Image Processing,2002,9:1014-1028.
  • 7Chun-shieu Lu et al.Denoising and copy attacks resilient Watermarking by Exploiting Prior Knowledge at Detector[J].IEEE Trans on Image Processing,2002,3:280-292.
  • 8Hsuand J C T,IEEE Trans Image Processing,1999年,8卷,1期,58页
  • 9Swanson M D,IEEE J Select Areas Commun,1998年,16卷,4期,540页
  • 10Hsu C T,IEEE Trans Circuit Syst II Analog Digital Signal Processing,1998年,45卷,8期,1097页

共引文献235

同被引文献24

  • 1易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程,2006,34(5):44-46. 被引量:23
  • 2吴平,梁青.一种基于信息分存和混沌序列的小波域信息隐藏方法[J].系统仿真学报,2006,18(9):2555-2558. 被引量:1
  • 3Frank Hartung, Martin Kutter. Multimedia Watermarking techniques[A]. Proceeding of the IEEE[C]. 1999,87 (7): 1 079-1 094.
  • 4Serdean C V, Ibrahim M K. Wavelet and Multiwavelet Watermarking[J].IET Image Process. , 2007, 1 ( 2).- 223 -230.
  • 5Mahmoud I Khalil. Digital Image Watermarking: Scalar Wavelet Versus Multiwavelet [J]. IET Image Process., 2007,1 (2) : 223 - 230.
  • 6Shen L, et al. Symmeritic and Antisymmeritic Orthonor- mal Multiwavelet and Related Scalar Wavelet [J]. Appl. Comput. Harmon. Anal. ,2000,8(5) :258 - 279.
  • 7Patile P,Sonavane S.Fragile watermarking schemefor image tamper detection[C]∥International Con-ference on Communication Systems and NetworkTechnologies.Jammu:IEEE,2011:531-535.
  • 8Zhang Xinpeng,Wang Shuozhong.Fragile water-marking with error-free restoration capability[J].IEEE Transactions on Multimedia,2008,10(8):1490-1499.
  • 9Amira H,Rhouma R,Belghith S.An eigen valuebased watermarking scheme for tamper detection ingray level images[C]∥7th International Multi-Con-ference on Systems Signals and Devices.Philadel-phia:IEEE,2010:1-5.
  • 10Fridrich J,Goljan M.Protection of digital images u-sing self embedding[C]∥Symposium Content Securi-ty and Data Hiding in Digital Media.Newark:NewJersey Institute of Technology,1999:5-9.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部