期刊文献+

基于神经网格的奇异值分解域公开水印算法 被引量:3

SVD Domain Public Watermarking Based on Neural Network
下载PDF
导出
摘要 提出了一种结合奇异值分解和神经网络的公开水印算法。首先对原始图像进行分块奇异值分解(SVD),然后建立最大奇异值系数与其他奇异值系数量化值之间的神经网络关系模型,最后通过调整最大奇异值与模型输出值之间的大小关系来嵌入水印信息。实验结果表明算法具有很好的水印透明性,对常见攻击(如JPEG压缩、平滑、加噪声和重采样等)具有较强的鲁棒性。 This paper presents a public watermarking algorithm combining single value decomposition (SVD) with neural network. We firstly use block single value decomposition to every block of original image, and then establish the relational model of neural network between the biggest single value coefficient and other coefficients. Finally a bit of the watermark is embedded by adjusting the polarity between the biggest value coefficient and the output value of the model. Experiment results show that this algorithm has good transparence of the embedded watermarking and is robust to attacks such as JPEG compression, smoothing, noise adding, and sampling.
作者 胡玉平
出处 《微电子学与计算机》 CSCD 北大核心 2008年第2期1-4,共4页 Microelectronics & Computer
基金 湖南省自然基金项目(06JJ5098) 中国博士后基金项目(20060390882)
关键词 数字水印 神经网络 奇异值分解 公开水印 digital watermarking neural network singular value decomposition public watermarking
  • 相关文献

参考文献8

  • 1IngemarJCox MatthewLMiller JeffreyABloom.数字水印[M].北京:电子工业出版社,2003.27-55.
  • 2李旭东,张振跃.利用矩阵范数实现的公开水印技术[J].计算机辅助设计与图形学学报,2005,17(8):1857-1861. 被引量:17
  • 3陈永强,胡汉平,李新天.基于协同神经网络的图像数字水印算法[J].中国图象图形学报,2005,10(7):894-899. 被引量:5
  • 4Davis K J, Najarian K. Maximizing strength of digital watermarks using neural networks [ C]. International Joint Conference on Neural Networks V4. Washington, DC, USA, 2001 : 2893 - 2898.
  • 5Wang Hungjen, Chang Chuanyu, Pan Shengwen. A DWTbased robust watermarking scheme with fuzzy ART [ C].International Joint Conference on Neural Networks. London, England, 2006 : 1750 - 1757.
  • 6Chang Chinchen, Tsai Piyu, Lin Chiachen. SVD-based digital image watermarking scheme[J ]. Pattern Recognition Letters,2005(26) : 1577 - 1586.
  • 7刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171. 被引量:217
  • 8Bas P, Chassery J M, Macq B. Image watermarking: an evolution to content approaches [J ]. Pattern recognition, 2002(35) :545 - 561.

二级参考文献24

  • 1Hsuand J C T,IEEE Trans Image Processing,1999年,8卷,1期,58页
  • 2Swanson M D,IEEE J Select Areas Commun,1998年,16卷,4期,540页
  • 3Hsu C T,IEEE Trans Circuit Syst II Analog Digital Signal Processing,1998年,45卷,8期,1097页
  • 4Swanson M D,Proc of ICIP'96,1996年,3卷,211页
  • 5Koch E,Proc Int Conference on Digital Media and Electronic Publishing,1994年,6页
  • 6CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003..
  • 7Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark [A]. In: Proceedings of the International Conference on Image Processing [C]. Austin: IEEE Press, 1994, 2:86~89.
  • 8Cox I J, Killian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673~ 1687.
  • 9Piva A, Barni M, Bartolini F. DCT-based watermark recovering without resorting to the uncorrupted original images [A]. In:Proceedings of IEEE International Conference on Image Processing, Atlanta, 1997. 520~523.
  • 10Kundur D, Hatzinakos D. Digital watermarking based on multiresolution wavelet data fusion [A]. In: Proceedings of IEEE International Conference on Image Processing, Atlanta,1997. 544~547.

共引文献249

同被引文献18

  • 1Zhang Li,Sam Kwong, Gang Wei. Geometric moment in image watermarking[ C]// Proceedings of the 2003 International Symposium on Circuits and Systems, China: City University of Hongkong, 2003 (2) : 25 - 28.
  • 2Alghoniemy M, Tewfik A H. Geometric distortions correction in image watermarking[C]//Proceedings of SHE on Security and watermarking of multimedia content. USA, California, 2003 (1) : 381 - 392.
  • 3Shapiro J M. Embed image coding using zeorotrees of wavelets coefficients [ J ]. IEE trans. On signal Processing, 1993,141(12) : 3445 - 3462.
  • 4Kim Bum- Soo, Choi Jae - Gark. A robust digital image watermarking method against geometrical attacks[J]. Real - Time Imaging,2003, 9(2) : 139 - 149.
  • 5Lei L, Yu P L, Tsai P L, et al. An efficientand and anonymous buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2004,32(16) : 1618 - 1626.
  • 6Ju H S, Kim H J, Lee D H, et al. An anonymous buyerseller watermarking protocol with anonymity control[J ]. ICISC 2002, LNCS 2587:421 -432.
  • 7Fan Chuni, Chen Mingte, Sun Weizhe. Buyer- seller watermarking protocols with off-line trusted parties[C]// MUE ' 07. International Conference on Multimedia and Ubiquitous Engineering. Secul: Kaoksiurg, 2007 (4) : 1035 - 1040.
  • 8Cheung Shingchi, Leung Hofung, Wang Changjie. A commutative encrypted protocol for the privacy protection of watermarks in digital contents [ J ]// Proceedings of the 37th Annual Hawaii International Conference on System Sciencesm. Hawaii, 2004(1) :94 - 103.
  • 9Zhang J, Kou W, Fan K. Secure buyer- seller watermarking protocol[J]. IEE Proceedings of information Security, 2006,153(3) : 15 - 18.
  • 10Qiao L, Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customer' s fights[J]. Visual comm and image representation, 1998, 23(9) : 194 -210.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部