期刊文献+

一种基于离散余弦变换与奇异值分解的数字图像水印算法 被引量:14

A Watermarking Algorithm for Digital Image Based on DCT and SVD
下载PDF
导出
摘要 结合奇异值分解(SVD)和离散余弦变换(DCT)的特点,提出了一种基于离散余弦变换与奇异值分解的数字图像水印算法。该算法能够很好地解决透明性和鲁棒性之间的矛盾。算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性。实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如:叠加噪声、JPEG压缩、滤波以及几何攻击等具有较好的鲁棒性。 A novel watermarking algorithm for digital image based on DCT and SVD is proposed in this paper, which combines both merits of discrete cosine transform (DCT) and singular value decomposition (SVD). The conflict between transparence and robustness of the watermark system is better solved by the algorithm. In the scheme, the embedded watermarking images are gray images which are scrambled, thereby increasing embedded information capacity and guaranting the safety of data. Experimental results show that the new watermarking scheme has a good transparence of embedded watermark image and is robust against attacks such as adding noise, filtering, JPEG compression and geometric distortion.
作者 刘俊景 蒋华
出处 《微电子学与计算机》 CSCD 北大核心 2007年第10期111-114,117,共5页 Microelectronics & Computer
关键词 数字水印 离散余弦变换 奇异值分解 图像置乱 watermark DCT SVD image scrambling
  • 相关文献

参考文献6

  • 1Liu R,Tan T.An SVD-based watermarking scheme for protectingrightful ownership[J].LEEE Transactions on Multimedia,2002,4(1):121-128
  • 2周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 3Cox IJ,Kilian J,Leighton T,et al.Secure spread spectrum watermarking for muhimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673-1687
  • 4丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843. 被引量:327
  • 5Zude Zhou,Bing Tang,Xinhua Liu.A block-SVD based image watermarking method[C].Proceedings of the 6th World Congress on Intelligent Control and Automation,Dalian,China,2006:10347-10351
  • 6Xinzhong Zhu,Jianmin Zhao,Huiying Xu.A digital watermarking algorithm and implementation based on improved SVD[C].In:The 18th IEEE International Conference on Pattem Recognition(ICPR),2006

二级参考文献13

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 3Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 4Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 5Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 6Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 7Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 8Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 9Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 10Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献420

同被引文献104

引证文献14

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部