期刊文献+

基于位平面分解技术的JPEG水印算法 被引量:1

Digital watermarking algorithm based on dual-tree complex wavelet transform
下载PDF
导出
摘要 提出一种基于位平面分解技术的JPEG压缩水印算法。该算法首先对图像进行置乱变换;然后采用位平面分解技术对灰度水印图像进行预处理操作,将该灰度水印图像转换成二值信息流;最后把水印嵌入载体图像中。实验表明,该算法对于不同类型的攻击有较强的鲁棒性。 The paper proposed a JPEG watermarking algorithm based on the decomposing technique of bit plane. This algorithm made a scrambling change to image at first, and then performed pre-processing operation of grey watermark image by using the decomposing technique of bit plane and changed the grey watermark image into binary-sequences. Finally, it embedded the watermark into cartier image. The experimental results show that the algorithm is robustness for different kinds of attack.
出处 《计算机应用研究》 CSCD 北大核心 2007年第11期121-123,126,共4页 Application Research of Computers
基金 广西留学回国人员科学基金资助项目(桂科回0342001) 广西科技攻关项目(桂科攻033008-9)
关键词 数字水印 位平面分解 置乱变换 静止图像压缩 鲁棒性 digital watermark decomposing of bit plane scrambling change JPEG robustness
  • 相关文献

参考文献8

  • 1WONG P H W,AU Q C.A capacity estimation technique for JPEG image watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):746-752.
  • 2WONG P H W,AU Q C.A blind watermarking technique in JPEG compressed domain[J].IEEE International Conference on Image Processing,2002 (3):497-500.
  • 3TAO B,DICKISON B.Adaptive watermarking in the DCT domain[C]//Proc of IEEE International Conference Acoustics,Speech,and Signal Processing.1997:2985-2988.
  • 4伍宏涛,胡云,钮心忻,杨义先.抗JPEG压缩和图像合并的水印算法[J].电子与信息学报,2005,27(6):914-918. 被引量:9
  • 5WONG P H W,OSCAR C,WONG J W C.Data hiding and watermarking in JPEG compressed domain by DC coefficient modification[C]//Proc of SPIE.2000:237-244.
  • 6刘化波,李秀艳,谢海燕,赵连昌.基于图像压缩标准JPEG和人类视觉系统的数字水印算法[J].大连海事大学学报,2005,31(1):99-101. 被引量:6
  • 7李霞,谭运猛,姚璐.一种基于JPEG压缩的信息隐藏方法[J].计算机工程与应用,2003,39(29):164-166. 被引量:5
  • 8LIN Yin.Stack filter design:a structural approach[J].IEEE Transactions on Signal Processing,1995,43(4):831-840.

二级参考文献20

  • 1吴秋新 钮心忻 杨义先 等.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 2W Bender et al.Teehniques for data hiding[R].Teehnieal report,Media Lab, MIT, 1994.
  • 3Anderson R.Information hiding[C].In:First International Workshop on I H 96,Cambridge, 1996.
  • 4Johnson N,Jajodia S.Exploring steganography:seeing and the unseen[J]. IEEE Computer, 1998 ;26-34.
  • 5Cachin C.An Information Theoretic Model for Steganography[C].In: Second International Workshop on Information Hiding,IH'98,Portland, Oregon, USA : proceedings, 1998 : 307-318.
  • 6Katzenbeisser S,Petitcdas F A P.Information Hiding Techniques for Steganography and Digital Waterrmarking[M].Artech House Computer Security Series, 1999.
  • 7Kenneth RCastleman Digital Image Processing'M].Prentice Hall/pearson, 2000.
  • 8BENDER W, GRUHL D, MORIMOTO N,et al. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35(3/4):313-336.
  • 9SHINFENG D L, CHEN C F. A robust DCT-based watermarking for copyright protection[J]. IEEE Transactions on Consumer Electronics, 2000,46(3):415-421.
  • 10WANG Y, DOHERTY J F, VAN DYCK R E. A wavelet-based watermarking algorithm for ownership verification of digital images[J]. IEEE Transactions on Image Processing, 2002, 11(2):77-88.

共引文献16

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部