期刊文献+

基于图像内容的自适应量化双水印算法

An Image Content-Based Bi-Watermarking with Adaptive Quantization
下载PDF
导出
摘要 提出一种在小波域嵌入双水印的新算法,该算法提取小波低频域的特征信息生成两个水印,将一个水印结合邻域信息以块量化方法嵌入,用于版权保护,将另一个水印的Hash值以单系数量化方法嵌入,用于内容认证,量化步长根据邻域的纹理特征自适应确定.实验结果表明,该算法在保护数字图像版权的同时,能够很好地完成内容真实性认证. A bi-watermarking algorithm with adaptive quantization is proposed based on DWT and image contents. In this algorithm, two watermarks are generated by extracting image feature from low frequency components. One watermark, for copyright protection, is embedded by block quantization with neighbor information, and another, for content authentication, is embedded by singular coefficient quantization. The quantization level is adaptively decided by texture features. It is shown in Experiments that the proposed bi-watermarking algorithm is good at copyright protection and content authentication simultaneously.
作者 陈力 韩娜
出处 《汕头大学学报(自然科学版)》 2007年第4期7-13,共7页 Journal of Shantou University:Natural Science Edition
基金 国家自然科学基金资助项目(No:60275011) 广东省自然科学基金资助项目(No:021252)
关键词 双水印 版权保护 内容认证 量化 自适应 bi-watermarking copyright protection content authentication quantization adaptation
  • 相关文献

参考文献9

二级参考文献36

  • 1张静,张春田.二值图像数字水印技术综述[J].计算机工程,2005,31(3):1-3. 被引量:9
  • 2[1]Lin E T, Delp E J. A Review of Fragile Image Watermarks[A]. ACM Multimedia '99[C]. Orlando,1999.25-29.
  • 3[2]Fridrich J. Methods for Detecting Changes In Digital Images[A], Proc. of The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98)[C]. Australia: Melbourne, 1998.
  • 4[3]Lin E T, Podilchuk C I, Delp E J. Detection of Image Alterations Using Semi_fragile Watermarks[A]. Proc. of SPIE Int. Conf. on Security and Watermarking of Multimedia Contents[C]. CA: San Jose, 2000. 3971.
  • 5[4]Wolfgang R B, Delp E J. A Watermark for Digital Images[J]. Proc. IEEE on Image Processing, 1996, 3: 219-222.
  • 6[5]Yu G J, Lu C S, Sheu J P, et al. Mean Quantization Blind Watermarking for Image Authentication[A]. Proc. IEEE Int. Conf. on Image Processing(Vol III)[C]. Canada: Vancouver, 2000.706-709.
  • 7[6]Kundur D, Hatzinakos D. Digital Watermarking for Telltale Tamper Proofing and Authentication[J]. Proc. of IEEE On Image Processing, 1999, 87: 1167-1180.
  • 8[7]Hartung F, Su J K, Girod B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks[A]. Security and Watermarking of Multimedia Contents Proc. [C].SPIE 3657, 1999.
  • 9[8]Craver S, Memon N, B-L Yeo, et al. Can Invisible Watermarking Resolve Rightful Ownerships[J]. IS&T/SPIE Electronic Imaging, 1998,3022: 310-321.
  • 10[9]Watson A B, Yang G Y, Solomon J A. Visibility of Wavelet Quantization Noise[J]. Proc. of IEEE Trans. On Image Processing, 1997, (6): 1164-1175.

共引文献499

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部